Mandrake Linux Security Advisory : apache (MDKSA-2003:103)

This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing one or more security
updates.

Description :

A buffer overflow in mod_alias and mod_rewrite was discovered in
Apache versions 1.3.19 and earlier as well as Apache 2.0.47 and
earlier. This happens when a regular expression with more than 9
captures is confined. An attacker would have to create a carefully
crafted configuration file (.htaccess or httpd.conf) in order to
exploit these problems.

As well, another buffer overflow in Apache 2.0.47 and earlier in
mod_cgid's mishandling of CGI redirect paths could result in CGI
output going to the wrong client when a threaded MPM is used.

Apache version 2.0.48 and 1.3.29 were released upstream to correct
these bugs; backported patches have been applied to the provided
packages.

See also :

http://www.apache.org/dist/httpd/Announcement.html
http://www.apache.org/dist/httpd/Announcement2.html

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 14085 (mandrake_MDKSA-2003-103.nasl)

Bugtraq ID:

CVE ID: CVE-2003-0542
CVE-2003-0789

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now