Mandrake Linux Security Advisory : apache (MDKSA-2004:065)

This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing one or more security
updates.

Description :

A buffer overflow vulnerability was found by George Guninski in
Apache's mod_proxy module, which can be exploited by a remote user to
potentially execute arbitrary code with the privileges of an httpd
child process (user apache). This can only be exploited, however, if
mod_proxy is actually in use.

It is recommended that you stop Apache prior to updating and then
restart it again once the update is complete ('service httpd stop' and
'service httpd start' respectively).

See also :

http://www.guninski.com/modproxy1.html

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 14164 (mandrake_MDKSA-2004-065.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0492

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now