Ubuntu Security Notice (C) 2009-2016 Canonical, Inc. / NASL script (C) 2009-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related patches.
Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3
protocols. If an attacker could perform a man in the middle attack at
the start of a TLS connection, the attacker could inject arbitrary
content at the beginning of the user's session. The flaw is with TLS
renegotiation and potentially affects any software that supports this
feature. Attacks against the HTTPS protocol are known, with the
severity of the issue depending on the safeguards used in the web
application. Until the TLS protocol and underlying libraries are
adjusted to defend against this vulnerability, a partial, temporary
workaround has been applied to Apache that disables client initiated
TLS renegotiation. This update does not protect against server
initiated TLS renegotiation when using SSLVerifyClient and
SSLCipherSuite on a per Directory or Location basis. Users can defend
againt server inititiated TLS renegotiation attacks by adjusting their
Apache configuration to use SSLVerifyClient and SSLCipherSuite only on
the server or virtual host level. (CVE-2009-3555)
It was discovered that mod_proxy_ftp in Apache did not properly
sanitize its input when processing replies to EPASV and PASV commands.
An attacker could use this to cause a denial of service in the Apache
child process. (CVE-2009-3094)
Another flaw was discovered in mod_proxy_ftp. If Apache is configured
as a reverse proxy, an attacker could send a crafted HTTP header to
bypass intended access controls and send arbitrary commands to the FTP
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 7.5
Public Exploit Available : false
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 42858 ()
Bugtraq ID: 362543626036935
CVE ID: CVE-2009-3094CVE-2009-3095CVE-2009-3555
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.