How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated mod_auth_any packages are available for Red Hat Enterprise
Linux. These updated packages fix vulnerabilities associated with the
manner in which mod_auth_any escapes shell arguments when calling
The Web server module mod_auth_any allows the Apache httpd server to
call arbitrary external programs to verify user passwords.
Vulnerabilities have been found in versions of mod_auth_any included
in Red Hat Enterprise Linux concerning the method by which
mod_auth_any escapes shell arguments when calling external programs.
These vulnerabilities allow remote attackers to run arbitrary commands
as the user under which the Web server is running. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2003-0084 to these issues.
All users are advised to upgrade to these errata packages, which
change the method by which external programs are invoked and,
therefore, make these programs invulnerable to these issues.
Red Hat would like to thank Daniel Jarboe and Maneesh Sahani for
bringing these issues to our attention.
See also :
Update the affected mod_auth_any package.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12383 ()
CVE ID: CVE-2003-0084
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.