Description: | Description:
The remote host is missing an update to apache announced via advisory MDKSA-2003:103.
A buffer overflow in mod_alias and mod_rewrite was discovered in Apache versions 1.3.19 and earlier as well as Apache 2.0.47 and earlier. This happens when a regular expression with more than 9 captures is confined. An attacker would have to create a carefully crafted configuration file (.htaccess or httpd.conf) in order to exploit these problems.
As well, another buffer overflow in Apache 2.0.47 and earlier in mod_cgid's mishandling of CGI redirect paths could result in CGI output going to the wrong client when a threaded MPM is used.
Apache version 2.0.48 and 1.3.29 were released upstream to correct these bugs backported patches have been applied to the provided packages.
Affected versions: 9.0, 9.1, 9.2, Corporate Server 2.1, Multi Network Firewall 8.2
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2003:103 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0542 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0789 http://www.apache.org/dist/httpd/Announcement.html http://www.apache.org/dist/httpd/Announcement2.html
Risk factor : Critical
CVSS Score: 10.0
|