English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75803 CVE descriptions
and 40037 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.54295
Category:Trustix Local Security Checks
Title:Trustix Security Advisory TSLSA-2004-0047 (Multiple packages)
Summary:Trustix Security Advisory TSLSA-2004-0047 (Multiple packages)
Description:
The remote host is missing updates announced in
advisory TSLSA-2004-0047.


apache:
(from http://httpd.apache.org)
This version of Apache is principally a bug fix release. Of particular
note is that 2.0.51 addresses five security vulnerabilities:

An input validation issue in IPv6 literal address parsing which can
result in a negative length parameter being passed to memcpy.
[CVE-2004-0786]

A buffer overflow in configuration file parsing could allow a local
user to gain the privileges of a httpd child if the server can be forced
to parse a carefully crafted .htaccess file.
[CVE-2004-0747]

A segfault in mod_ssl which can be triggered by a malicious remote
server, if proxying to SSL servers has been configured.
[CVE-2004-0751]

A potential infinite loop in mod_ssl which could be triggered given
particular timing of a connection abort.
[CVE-2004-0748]

A segfault in mod_dav_fs which can be remotely triggered by an indirect
lock refresh request.
[CVE-2004-0809]

cups:
Alvaro Martinez Echevarria discovered a bug that made it possible to
disable browsing in CUPS by sending an empty UDP datagram to the port
where cupsd is running.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-0558 to this issue.

foomatic-filters:
(from http://www.linuxprinting.org/)
It was possible to make foomatic-rip execute arbitrary commands as the
user lp (or however the spooler's special user is called) on the
print server.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-0801 to this issue.

iptables:
Package cleanup. Init script improvements. Not a security fix.

squid:
Certain malformed NTLMSSP packets could crash the NTLM helpers
provided by Squid.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-0832 to this issue.


Solution:
Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2004-0047

Risk factor : High
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0786
http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096
SuSE Security Announcement: SUSE-SA:2004:032 (Google Search)
http://www.novell.com/linux/security/advisories/2004_32_apache2.html
http://www.redhat.com/support/errata/RHSA-2004-463.html
http://www.trustix.org/errata/2004/0047/
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11380
http://secunia.com/advisories/12540
XForce ISS Database: apache-ipv6-aprutil-dos(17382)
http://xforce.iss.net/xforce/xfdb/17382
Common Vulnerability Exposure (CVE) ID: CVE-2004-0747
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
CERT/CC vulnerability note: VU#481998
http://www.kb.cert.org/vuls/id/481998
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11561
http://securitytracker.com/id?1011303
http://secunia.com/advisories/34920
http://www.vupen.com/english/advisories/2009/1233
XForce ISS Database: apache-env-configuration-bo(17384)
http://xforce.iss.net/xforce/xfdb/17384
Common Vulnerability Exposure (CVE) ID: CVE-2004-0751
Bugtraq: 20040911 Remote buffer overflow in Apache mod_ssl when reverse proxying SSL (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2004-09/0096.html
SuSE Security Announcement: SUSE-SA:2004:030 (Google Search)
http://www.novell.com/linux/security/advisories/2004_30_apache2.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11864
XForce ISS Database: apache-modssl-speculative-dos(17273)
http://xforce.iss.net/xforce/xfdb/17273
Common Vulnerability Exposure (CVE) ID: CVE-2004-0748
http://www.redhat.com/support/errata/RHSA-2004-349.html
AUSCERT Advisory: ESB-2004.0553
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11126
XForce ISS Database: apache-modssl-dos(17200)
http://xforce.iss.net/xforce/xfdb/17200
Common Vulnerability Exposure (CVE) ID: CVE-2004-0809
Debian Security Information: DSA-558 (Google Search)
http://www.debian.org/security/2004/dsa-558
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9588
XForce ISS Database: apache-moddav-lock-dos(17366)
http://xforce.iss.net/xforce/xfdb/17366
Common Vulnerability Exposure (CVE) ID: CVE-2004-0558
http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html
Debian Security Information: DSA-545 (Google Search)
http://www.debian.org/security/2004/dsa-545
https://bugzilla.fedora.us/show_bug.cgi?id=2072
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:097
http://www.redhat.com/support/errata/RHSA-2004-449.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57646-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201005-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000757.1-1
SuSE Security Announcement: SUSE-SA:2004:031 (Google Search)
http://www.suse.com/de/security/2004_31_cups.html
SCO Security Bulletin: SCOSA-2004.15
http://marc.theaimsgroup.com/?l=bugtraq&m=109760654431316&w=2
Conectiva Linux advisory: CLA-2004:872
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000872
BugTraq ID: 11183
http://www.securityfocus.com/bid/11183
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11732
XForce ISS Database: cups-udp-dos(17389)
http://xforce.iss.net/xforce/xfdb/17389
Common Vulnerability Exposure (CVE) ID: CVE-2004-0801
Conectiva Linux advisory: CLA-2004:880
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000880
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:094
SCO Security Bulletin: SCOSA-2005.12
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.12/SCOSA-2005.12.txt
http://www.novell.com/linux/security/advisories/2004_31_cups.html
SuSE Security Announcement: SUSE-SA:2006:026 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-May/0007.html
http://www.trustix.net/errata/2004/0047/
BugTraq ID: 11184
http://www.securityfocus.com/bid/11184
http://secunia.com/advisories/12557/
http://secunia.com/advisories/20312
XForce ISS Database: foomatic-command-execution(17388)
http://xforce.iss.net/xforce/xfdb/17388
Common Vulnerability Exposure (CVE) ID: CVE-2004-0832
http://fedoranews.org/updates/FEDORA--.shtml
http://www.gentoo.org/security/en/glsa/glsa-200409-04.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2004:093
BugTraq ID: 11098
http://www.securityfocus.com/bid/11098
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10489
XForce ISS Database: squid-ntlmssp-dos(17218)
http://xforce.iss.net/xforce/xfdb/17218
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 40037 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.