Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51415
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2003:632
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory CLA-2003:632.

Apache[1] is the most popular webserver in use today.

This update fixes two security vulnerabilities:

1. Denial of service (CVE-2003-0132)[3]
David Endler from iDefense reported[2] a denial of service condition
that affects the apache 2.0 branch which affects all unpatched
servers up to and including version 2.0.44.

There is a memory leak in these apache versions which can be remotely
triggered by sending large chunks of consecutive linefeed characters.
Each linefeed will cause the server to allocate 80 bytes of memory.

A remote attacker can keep sending these simple requests until the
server's memory is exhausted.

2. File descriptor leak[5]
Christian Kratzer and Bjoern A. Zeeb identified several file
descriptor leaks to child processes, such as CGI scripts, which could
consitute a security threat on servers that run untrusted CGI
scripts.

The Apache HTTP Server Project released[4] Apache version 2.0.45 to
address these issues, and this is the version provided via this
update.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:632
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0132
Bugtraq: 20030402 [ANNOUNCE] Apache 2.0.45 Released (Google Search)
http://marc.info/?l=bugtraq&m=104931360606484&w=2
Bugtraq: 20030408 Exploit Code Released for Apache 2.x Memory Leak (Google Search)
http://marc.info/?l=bugtraq&m=104994309010974&w=2
Bugtraq: 20030408 iDEFENSE Security Advisory 04.08.03: Denial of Service in Apache HTTP Server 2.x (Google Search)
http://marc.info/?l=bugtraq&m=104982175321731&w=2
Bugtraq: 20030409 GLSA: apache (200304-01) (Google Search)
http://marc.info/?l=bugtraq&m=104994239010517&w=2
Bugtraq: 20030410 working apache <= 2.0.44 DoS exploit for linux. (Google Search)
http://marc.info/?l=bugtraq&m=105001663120995&w=2
Bugtraq: 20030411 PATCH: [CAN-2003-0132] Apache 2.0.44 Denial of Service (Google Search)
http://marc.info/?l=bugtraq&m=105013378320711&w=2
CERT/CC vulnerability note: VU#206537
http://www.kb.cert.org/vuls/id/206537
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
http://www.idefense.com/advisory/04.08.03.txt
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A156
http://www.redhat.com/support/errata/RHSA-2003-139.html
http://secunia.com/advisories/34920
http://secunia.com/advisories/8499
http://www.vupen.com/english/advisories/2009/1233
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.