Mandrake Linux Security Advisory : apache2 (MDKSA-2005:129)

This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing one or more security
updates.

Description :

Marc Stern reported an off-by-one overflow in the mod_ssl CRL
verification callback which can only be exploited if the Apache server
is configured to use a malicious certificate revocation list
(CVE-2005-1268).

Watchfire reported a flaw that occured when using the Apache server as
a HTTP proxy. A remote attacker could send an HTTP request with both a
'Transfer-Encoding: chunked' header and a 'Content-Length' header
which would cause Apache to incorrectly handle and forward the body of
the request in a way that the receiving server processed it as a
separate HTTP request. This could be used to allow the bypass of web
application firewall protection or lead to cross-site scripting (XSS)
attacks (CVE-2005-2088).

The updated packages have been patched to prevent these issues.

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 19889 (mandrake_MDKSA-2005-129.nasl)

Bugtraq ID: 14106
14366

CVE ID: CVE-2005-1268
CVE-2005-2088

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now