How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200409-21
(Apache 2, mod_dav: Multiple vulnerabilities)
A potential infinite loop has been found in the input filter of mod_ssl
(CAN-2004-0748) as well as a possible segmentation fault in the
char_buffer_read function if reverse proxying to a SSL server is being used
(CAN-2004-0751). Furthermore, mod_dav, as shipped in Apache httpd 2 or
mod_dav 1.0.x for Apache 1.3, contains a NULL pointer dereference which can
be triggered remotely (CAN-2004-0809). The third issue is an input
validation error found in the IPv6 URI parsing routines within the apr-util
library (CAN-2004-0786). Additionally a possible buffer overflow has been
reported when expanding environment variables during the parsing of
configuration files (CAN-2004-0747).
A remote attacker could cause a Denial of Service either by aborting a SSL
connection in a special way, resulting in CPU consumption, by exploiting
the segmentation fault in mod_ssl or the mod_dav flaw. A remote attacker
could also crash a httpd child process by sending a specially crafted URI.
The last vulnerability could be used by a local user to gain the privileges
of a httpd child, if the server parses a carefully prepared .htaccess file.
There is no known workaround at this time.
See also :
All Apache 2 users should upgrade to the latest version:
# emerge sync
# emerge -pv '>=www-servers/apache-2.0.51'
# emerge '>=www-servers/apache-2.0.51'
All mod_dav users should upgrade to the latest version:
# emerge sync
# emerge -pv '>=net-www/mod_dav-1.0.3-r2'
# emerge '>=net-www/mod_dav-1.0.3-r2'
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.2
Public Exploit Available : false
Family: Gentoo Local Security Checks
Nessus Plugin ID: 14766 (gentoo_GLSA-200409-21.nasl)
CVE ID: CVE-2004-0747CVE-2004-0748CVE-2004-0751CVE-2004-0786CVE-2004-0809
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.