Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51425
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2003:661
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory CLA-2003:661.

Apache[1] is the most popular webserver in use today.

This update addresses two security vulnerabilities which have been
fixed in the recently released[2] 2.0.46 version:

1) CVE-2003-0245[3]
iDefense published[5] an advisory about a vulnerability in the APR
library used by Apache 2. This library contains a vulnerability in
the apr_psprintf() function which could be used to make apache
reference invalid memory.

The most immediate impact of this vulnerability is a Denial of
Service condition. Arbitrary command execution remains a possibility,
but is deemed to be difficult to achieve outside a controlled
environment.

The packages provided with this update contain a fix for this
vulnerability.

2) CVE-2003-0189[4]
A problem with the build configuration scripts caused the Apache
basic authentication module to not be thread-safe. Systems running a
threaded server would then be vulnerable to a Denial of Service
condition when authenticating users using this module. Apache in
Conectiva Linux 9 is *not* vulnerable to this issue because it is not
built with threads support. However, the packages available through
this update have been patched to fix this problem to allow users to
recompile Apache with threads support in the event they choose to do
so.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:661
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0245
BugTraq ID: 7723
http://www.securityfocus.com/bid/7723
Bugtraq: 20030528 [SECURITY] [ANNOUNCE] Apache 2.0.46 released (Google Search)
http://marc.info/?l=bugtraq&m=105418115512559&w=2
CERT/CC vulnerability note: VU#757612
http://www.kb.cert.org/vuls/id/757612
Conectiva Linux advisory: CLA-2003:661
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000661
http://www.mandriva.com/security/advisories?name=MDKSA-2003:063
http://www.idefense.com/advisory/05.30.03.txt
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
http://www.redhat.com/support/errata/RHSA-2003-186.html
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0095.html
XForce ISS Database: apache-aprpsprintf-code-execution(12090)
https://exchange.xforce.ibmcloud.com/vulnerabilities/12090
Common Vulnerability Exposure (CVE) ID: CVE-2003-0189
BugTraq ID: 7725
http://www.securityfocus.com/bid/7725
CERT/CC vulnerability note: VU#479268
http://www.kb.cert.org/vuls/id/479268
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E
http://secunia.com/advisories/8881
XForce ISS Database: apache-aprpasswordvalidate-dos(12091)
https://exchange.xforce.ibmcloud.com/vulnerabilities/12091
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.