FreeBSD : apache -- http request smuggling (651996e0-fe07-11d9-8329-000e0c2e438a)

medium Nessus Plugin ID 19346

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

A Watchfire whitepaper reports an vulnerability in the Apache webserver. The vulnerability can be exploited by malicious people causing cross site scripting, web cache poisoining, session hijacking and most importantly the ability to bypass web application firewall protection. Exploiting this vulnerability requires multiple carefully crafted HTTP requests, taking advantage of an caching server, proxy server, web application firewall etc. This only affects installations where Apache is used as HTTP proxy in combination with the following web servers :

- IIS/6.0 and 5.0

- Apache 2.0.45 (as web server)

- apache 1.3.29

- WebSphere 5.1 and 5.0

- WebLogic 8.1 SP1

- Oracle9iAS web server 9.0.2

- SunONE web server 6.1 SP4

Solution

Update the affected packages.

See Also

http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf

http://www.nessus.org/u?03ca4f0d

Plugin Details

Severity: Medium

ID: 19346

File Name: freebsd_pkg_651996e0fe0711d98329000e0c2e438a.nasl

Version: 1.21

Type: local

Published: 8/1/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.5

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apache, p-cpe:/a:freebsd:freebsd:apache%2bipv6, p-cpe:/a:freebsd:freebsd:apache%2bmod_perl, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bipv6, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_accel, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_accel%2bipv6, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_accel%2bmod_deflate, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_accel%2bmod_deflate%2bipv6, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_deflate, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_deflate%2bipv6, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_snmp, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_snmp%2bmod_accel, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_snmp%2bmod_accel%2bipv6, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_snmp%2bmod_accel%2bmod_deflate%2bipv6, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_snmp%2bmod_deflate, p-cpe:/a:freebsd:freebsd:apache%2bmod_ssl%2bmod_snmp%2bmod_deflate%2bipv6, p-cpe:/a:freebsd:freebsd:apache%2bssl, p-cpe:/a:freebsd:freebsd:apache_fp, p-cpe:/a:freebsd:freebsd:ru-apache, p-cpe:/a:freebsd:freebsd:ru-apache%2bmod_ssl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 7/26/2005

Vulnerability Publication Date: 7/25/2005

Reference Information

CVE: CVE-2005-2088

BID: 14106