![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.53433 |
Category: | Debian Local Security Checks |
Title: | Debian Security Advisory DSA 181-1 (libapache-mod-ssl) |
Summary: | The remote host is missing an update to libapache-mod-ssl;announced via advisory DSA 181-1. |
Description: | Summary: The remote host is missing an update to libapache-mod-ssl announced via advisory DSA 181-1. Vulnerability Insight: Joe Orton discovered a cross site scripting problem in mod_ssl, an Apache module that adds Strong cryptography (i.e. HTTPS support) to the webserver. The module will return the server name unescaped in the response to an HTTP request on an SSL port. Like the other recent Apache XSS bugs, this only affects servers using a combination of UseCanonicalName off (default in the Debian package of Apache) and wildcard DNS. This is very unlikely to happen, though. Apache 2.0/mod_ssl is not vulnerable since it already escapes this HTML. With this setting turned on, whenever Apache needs to construct a self-referencing URL (a URL that refers back to the server the response is coming from) it will use ServerName and Port to form a canonical name. With this setting off, Apache will use the hostname:port that the client supplied, when possible. This also affects SERVER_NAME and SERVER_PORT in CGI scripts. This problem has been fixed in version 2.8.9-2.1 for the current stable distribution (woody), in version 2.4.10-1.3.9-1potato4 for the old stable distribution (potato) and version 2.8.9-2.3 for the unstable distribution (sid). Solution: We recommend that you upgrade your libapache-mod-ssl package. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2002-1157 BugTraq ID: 6029 http://www.securityfocus.com/bid/6029 Bugtraq: 20021023 [OpenPKG-SA-2002.010] OpenPKG Security Advisory (apache) (Google Search) http://online.securityfocus.com/archive/1/296753 Bugtraq: 20021026 GLSA: mod_ssl (Google Search) http://archives.neohapsis.com/archives/bugtraq/2002-10/0374.html Conectiva Linux advisory: CLA-2002:541 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000541 Debian Security Information: DSA-181 (Google Search) http://www.debian.org/security/2002/dsa-181 En Garde Linux Advisory: ESA-20021029-027 http://www.linuxsecurity.com/advisories/other_advisory-2512.html http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-072.php http://www.osvdb.org/2107 http://www.redhat.com/support/errata/RHSA-2002-222.html http://www.redhat.com/support/errata/RHSA-2002-243.html http://www.redhat.com/support/errata/RHSA-2002-244.html http://www.redhat.com/support/errata/RHSA-2002-248.html http://www.redhat.com/support/errata/RHSA-2002-251.html http://www.redhat.com/support/errata/RHSA-2003-106.html http://www.iss.net/security_center/static/10457.php |
Copyright | Copyright (C) 2008 E-Soft Inc. |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |