FreeBSD : mod_access_referer -- NULL pointer dereference vulnerability (af747389-42ba-11d9-bd37-00065be4b5b6)

medium Nessus Plugin ID 19081

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

A malformed Referer header field causes the Apache ap_parse_uri_components function to discard it with the result that a pointer is not initialized. The mod_access_referer module does not take this into account with the result that it may use such a pointer.

The NULL pointer vulnerability may possibly be used in a remote denial of service attack against affected Apache servers.

Solution

Update the affected package.

See Also

https://marc.info/?l=full-disclosure&m=105053485515811

http://www.nessus.org/u?0d722888

Plugin Details

Severity: Medium

ID: 19081

File Name: freebsd_pkg_af74738942ba11d9bd3700065be4b5b6.nasl

Version: 1.20

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:mod_access_referer, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 12/11/2004

Vulnerability Publication Date: 4/16/2003

Reference Information

CVE: CVE-2003-1054

BID: 7375

Secunia: 8612