How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
An updated mod_ssl package for Apache that fixes a format string
vulnerability is now available.
The mod_ssl module provides strong cryptography for the Apache Web
server via the Secure Sockets Layer (SSL) and Transport Layer Security
A format string issue was discovered in mod_ssl for Apache 1.3 which
can be triggered if mod_ssl is configured to allow a client to proxy
to remote SSL sites. In order to exploit this issue, a user who is
authorized to use Apache as a proxy would have to attempt to connect
to a carefully crafted hostname via SSL. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name
CVE-2004-0700 to this issue.
Users of mod_ssl should upgrade to this updated package, which
contains a backported patch to correct this issue.
See also :
Update the affected mod_ssl package.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 14698 ()
CVE ID: CVE-2004-0700
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.