This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
CVE-2010-0408 httpd: mod_proxy_ajp remote temporary DoS
CVE-2010-0434 httpd: request header information leak
It was discovered that mod_proxy_ajp incorrectly returned an 'Internal
Server Error' response when processing certain malformed requests,
which caused the back-end server to be marked as failed in
configurations where mod_proxy is used in load balancer mode. A remote
attacker could cause mod_proxy to not send requests to back-end AJP
(Apache JServ Protocol) servers for the retry timeout period (60
seconds by default) by sending specially-crafted requests.
A use-after-free flaw was discovered in the way the Apache HTTP Server
handled request headers in subrequests. In configurations where
subrequests are used, a multithreaded MPM (Multi-Processing Module)
could possibly leak information from other requests in request
This update also adds the following enhancement :
- with the updated openssl packages from RHSA-2010:0162
installed, mod_ssl will refuse to renegotiate a TLS/SSL
connection with an unpatched client that does not
support RFC 5746. This update adds the
'SSLInsecureRenegotiation' configuration directive. If
this directive is enabled, mod_ssl will renegotiate
insecurely with unpatched clients. (BZ#567980)
Refer to the following Red Hat Knowledgebase article for more details
about the changed mod_ssl behavior:
After installing the updated packages, the httpd daemon must be
restarted for the update to take effect.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.0