Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51502
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2002:465
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory CLA-2002:465.

mod_ssl[1] is an Apache module which enables the use of encrypted
connections (https://) to the web server and other crypto-related
functions.

Ed Moyle announced[2] a buffer overflow
vulnerability[3] in the mod_ssl module. This module is not part of
the apache distribution, but is bundled and enabled by default in the
Conectiva Linux Apache packages.

A remote attacker could exploit this vulnerability and execute
arbitrary commands on the server running apache with this module
enabled. A probable way to explore this is via client certificate
authentication, where the attacker would use a specially crafted
certificate to overflow this buffer. Since this vulnerability happens
only after the client certificate has been checked, this means that
it would have to be signed by a CA accepted by the apache server.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.securityspace.com/smysecure/catid.html?in=CLA-2002:465
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002002

Risk factor : High

CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.