English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 73247 CVE descriptions
and 39212 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.11030
Category:Gain a shell remotely
Title:Apache chunked encoding
Summary:Checks for version or behavior of Apache
Description:
The remote host appears to be vulnerable to the Apache
Web Server Chunk Handling Vulnerability.

If Safe Checks are enabled, this may be a false positive
since it is based on the version of Apache. Although
unpatched Apache versions 1.2.2 and above, 1.3 through
1.3.24 and 2.0 through 2.0.36, the remote server may
be running a patched version of Apache

Solution : Upgrade to version 1.3.26 or 2.0.39 or newer
See also : http://httpd.apache.org/info/security_bulletin_20020617.txt
http://httpd.apache.org/info/security_bulletin_20020620.txt
Risk factor : High
Cross-Ref: BugTraq ID: 5033
Common Vulnerability Exposure (CVE) ID: CVE-2002-0392
ISS Security Advisory: 20020617 Remote Compromise Vulnerability in Apache HTTP Server
Bugtraq: 20020617 Re: ISS Advisory: Remote Compromise Vulnerability in Apache HTTP Server (Google Search)
Bugtraq: 20020617 Re: Remote Compromise Vulnerability in Apache HTTP Server (Google Search)
Bugtraq: 20020618 Fixed version of Apache 1.3 available (Google Search)
Bugtraq: 20020619 Implications of Apache vuln for Oracle (Google Search)
Bugtraq: 20020619 Remote Apache 1.3.x Exploit (Google Search)
Bugtraq: 20020620 Apache Exploit (Google Search)
Bugtraq: 20020620 TSLSA-2002-0056 - apache (Google Search)
Bugtraq: 20020621 [SECURITY] Remote exploit for 32-bit Apache HTTP Server known (Google Search)
http://online.securityfocus.com/archive/1/278149
Bugtraq: 20020622 Ending a few arguments with one simple attachment. (Google Search)
Bugtraq: 20020622 blowchunks - protecting existing apache servers until upgrades arrive (Google Search)
http://www.cert.org/advisories/CA-2002-17.html
HPdes Security Advisory: HPSBMA02149
http://www2.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&docId=200000083816475
HPdes Security Advisory: SSRT050968
SGI Security Advisory: 20020605-01-A
ftp://patches.sgi.com/support/free/security/advisories/20020605-01-A
SGI Security Advisory: 20020605-01-I
ftp://patches.sgi.com/support/free/security/advisories/20020605-01-I
RedHat Security Advisories: RHSA-2002:103
http://rhn.redhat.com/errata/RHSA-2002-103.html
http://www.redhat.com/support/errata/RHSA-2002-126.html
http://www.redhat.com/support/errata/RHSA-2002-150.html
http://www.redhat.com/support/errata/RHSA-2003-106.html
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:039
Caldera Security Advisory: CSSA-2002-029.0
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-029.0.txt
Caldera Security Advisory: CSSA-2002-SCO.31
ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.31
Caldera Security Advisory: CSSA-2002-SCO.32
ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.32
COMPAQ Service Security Patch: SSRT2253
Conectiva Linux advisory: CLSA-2002:498
http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000498
Debian Security Information: DSA-131 (Google Search)
http://www.debian.org/security/2002/dsa-131
Debian Security Information: DSA-132 (Google Search)
http://www.debian.org/security/2002/dsa-132
Debian Security Information: DSA-133 (Google Search)
http://www.debian.org/security/2002/dsa-133
En Garde Linux Advisory: ESA-20020619-014
http://www.linuxsecurity.com/advisories/other_advisory-2137.html
RedHat Security Advisories: RHSA-2002:118
http://rhn.redhat.com/errata/RHSA-2002-118.html
RedHat Security Advisories: RHSA-2002:117
http://rhn.redhat.com/errata/RHSA-2002-117.html
Bugtraq: 20020619 [OpenPKG-SA-2002.004] OpenPKG Security Advisory (apache) (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2002-06/0235.html
Bugtraq: 20020621 [slackware-security] new apache/mod_ssl packages available (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2002-06/0266.html
SuSE Security Announcement: SuSE-SA:2002:022 (Google Search)
http://www.novell.com/linux/security/advisories/2002_22_apache.html
CERT/CC vulnerability note: VU#944335
http://www.kb.cert.org/vuls/id/944335
HPdes Security Advisory: HPSBTL0206-049
http://online.securityfocus.com/advisories/4240
HPdes Security Advisory: HPSBUX0207-197
http://online.securityfocus.com/advisories/4257
http://www.securityfocus.com/bid/5033
BugTraq ID: 20005
http://www.securityfocus.com/bid/20005
http://www.frsirt.com/english/advisories/2006/3598
http://www.osvdb.org/838
http://secunia.com/advisories/21917
http://www.iss.net/security_center/static/9249.php
CopyrightThis script is Copyright (C) 2002 Renaud Deraison

This is only one of 39212 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.