This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated mod_ssl packages are now available for Red Hat Advanced
Server. These updates incorporate a fix for an incorrect bounds check
in versions of mod_ssl up to and including version 2.8.9.
The mod_ssl module provides strong cryptography for the Apache Web
server via the Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) protocols. Versions of mod_ssl prior to 2.8.10 are subject to a
single NULL overflow that can cause arbitrary code execution.
In order to exploit this vulnerability, the Apache Web server has to
be configured to allow overriding of configuration settings on a
per-directory basis, and untrusted local users must be able to modify
a directory in which the server is configured to allow overriding. The
local attacker may then become the user that Apache is running as
(usually 'www' or 'nobody').
Note that regardless of this bug, local users can obtain the same
privileges if the server is configured to allow them to create CGI
scripts which run as the Web server user, or if PHP is enabled but not
configured in 'safe mode'.
The errata packages contain versions of mod_ssl that have been patched
and are not vulnerable to this issue.
Please note that you must restart the httpd daemon to use the updated
module. For instructions on doing this, see the bottom of the
Solutions section below.
See also :
Update the affected mod_ssl package.
Risk factor :
Medium / CVSS Base Score : 4.6
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12310 ()
CVE ID: CVE-2002-0653
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.