Description: | Summary: The remote host is missing an update for the Debian 'libapache-mod-ssl' package(s) announced via the DSA-532-1 advisory.
This VT has been deprecated and merged into the VT 'Debian: Security Advisory (DSA-532)' (OID: 1.3.6.1.4.1.25623.1.0.53224).
Vulnerability Insight: Two vulnerabilities were discovered in libapache-mod-ssl:
CAN-2004-0488
Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.
CAN-2004-0700
Format string vulnerability in the ssl_log function in ssl_engine_log.c in mod_ssl 2.8.19 for Apache 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS.
For the current stable distribution (woody), these problems have been fixed in version 2.8.9-2.4.
For the unstable distribution (sid), CAN-2004-0488 was fixed in version 2.8.18, and CAN-2004-0700 will be fixed soon.
We recommend that you update your libapache-mod-ssl package.
Affected Software/OS: 'libapache-mod-ssl' package(s) on Debian 3.0.
Solution: Please install the updated package(s).
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|