Mandrake Linux Security Advisory : apache (MDKSA-2005:130)

This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing one or more security
updates.

Description :

Watchfire reported a flaw that occured when using the Apache server as
a HTTP proxy. A remote attacker could send an HTTP request with both a
'Transfer-Encoding: chunked' header and a 'Content-Length' header
which would cause Apache to incorrectly handle and forward the body of
the request in a way that the receiving server processed it as a
separate HTTP request. This could be used to allow the bypass of web
application firewall protection or lead to cross-site scripting (XSS)
attacks (CVE-2005-2088).

The updated packages have been patched to prevent these issues.

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 19890 (mandrake_MDKSA-2005-130.nasl)

Bugtraq ID: 14106

CVE ID: CVE-2005-2088

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now