This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200807-06
(Apache: Denial of Service)
Multiple vulnerabilities have been discovered in Apache:
Dustin Kirkland reported that the mod_ssl module can leak memory when
the client reports support for a compression algorithm (CVE-2008-1678).
Ryujiro Shibuya reported that the ap_proxy_http_process_response()
function in the mod_proxy module does not limit the number of forwarded
interim responses (CVE-2008-2364).
sp3x of SecurityReason reported a Cross-Site Request Forgery
vulnerability in the balancer-manager in the mod_proxy_balancer module
A remote attacker could exploit these vulnerabilities by connecting to
an Apache httpd, by causing an Apache proxy server to connect to a
malicious server, or by enticing a balancer administrator to connect to
a specially crafted URL, resulting in a Denial of Service of the Apache
There is no known workaround at this time.
See also :
All Apache users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-servers/apache-2.2.9'
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 5.0
Public Exploit Available : false
Family: Gentoo Local Security Checks
Nessus Plugin ID: 33473 (gentoo_GLSA-200807-06.nasl)
CVE ID: CVE-2007-6420CVE-2008-1678CVE-2008-2364
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.