How to Buy
This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200907-02
(ModSecurity: Denial of Service)
Multiple vulnerabilities were discovered in ModSecurity:
Juan Galiana Lara of ISecAuditors discovered a NULL pointer
dereference when processing multipart requests without a part header
Steve Grubb of Red Hat reported that the
'PDF XSS protection' feature does not properly handle HTTP requests to
a PDF file that do not use the GET method (CVE-2009-1903).
A remote attacker might send requests containing specially crafted
multipart data or send certain requests to access a PDF file, possibly
resulting in a Denial of Service (crash) of the Apache HTTP daemon.
NOTE: The PDF XSS protection is not enabled by default.
There is no known workaround at this time.
See also :
All ModSecurity users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-apache/mod_security-2.5.9'
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : true
Family: Gentoo Local Security Checks
Nessus Plugin ID: 39596 (gentoo_GLSA-200907-02.nasl)
Bugtraq ID: 34096
CVE ID: CVE-2009-1902CVE-2009-1903
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.