English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 61204 CVE descriptions
and 32582 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51425
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2003:661
Summary:Conectiva Security Advisory CLA-2003:661
Description:
The remote host is missing updates announced in
advisory CLA-2003:661.

Apache[1] is the most popular webserver in use today.

This update addresses two security vulnerabilities which have been
fixed in the recently released[2] 2.0.46 version:

1) CVE-2003-0245[3]
iDefense published[5] an advisory about a vulnerability in the APR
library used by Apache 2. This library contains a vulnerability in
the apr_psprintf() function which could be used to make apache
reference invalid memory.

The most immediate impact of this vulnerability is a Denial of
Service condition. Arbitrary command execution remains a possibility,
but is deemed to be difficult to achieve outside a controlled
environment.

The packages provided with this update contain a fix for this
vulnerability.

2) CVE-2003-0189[4]
A problem with the build configuration scripts caused the Apache
basic authentication module to not be thread-safe. Systems running a
threaded server would then be vulnerable to a Denial of Service
condition when authenticating users using this module. Apache in
Conectiva Linux 9 is *not* vulnerable to this issue because it is not
built with threads support. However, the packages available through
this update have been patched to fix this problem to allow users to
recompile Apache with threads support in the event they choose to do
so.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:661
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : Medium
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0245
Bugtraq: 20030528 [SECURITY] [ANNOUNCE] Apache 2.0.46 released (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=105418115512559&w=2
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0095.html
http://www.idefense.com/advisory/05.30.03.txt
http://www.redhat.com/support/errata/RHSA-2003-186.html
Conectiva Linux advisory: CLA-2003:661
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000661
http://www.mandriva.com/security/advisories?name=MDKSA-2003:063
CERT/CC vulnerability note: VU#757612
http://www.kb.cert.org/vuls/id/757612
XForce ISS Database: apache-aprpsprintf-code-execution(12090)
http://xforce.iss.net/xforce/xfdb/12090
BugTraq ID: 7723
http://www.securityfocus.com/bid/7723
Common Vulnerability Exposure (CVE) ID: CVE-2003-0189
CERT/CC vulnerability note: VU#479268
http://www.kb.cert.org/vuls/id/479268
BugTraq ID: 7725
http://www.securityfocus.com/bid/7725
http://secunia.com/advisories/8881
XForce ISS Database: apache-aprpasswordvalidate-dos(12091)
http://xforce.iss.net/xforce/xfdb/12091
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 32582 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.