This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
The Apache HTTP Server did not verify that a process was an Apache
child process before sending it signals. A local attacker with the
ability to run scripts on the Apache HTTP Server could manipulate the
scoreboard and cause arbitrary processes to be terminated which could
lead to a denial of service (CVE-2007-3304). This issue is not
exploitable on Fedora if using the default SELinux targeted policy.
A flaw was found in the Apache HTTP Server mod_status module. On sites
where the server-status page is publicly accessible and ExtendedStatus
is enabled this could lead to a cross-site scripting attack. On Fedora
the server-status page is not enabled by default and it is best
practice to not make this publicly available. (CVE-2006-5752)
A bug was found in the Apache HTTP Server mod_cache module. On sites
where caching is enabled, a remote attacker could send a carefully
crafted request that would cause the Apache child process handling
that request to crash. This could lead to a denial of service if using
a threaded Multi-Processing Module. (CVE-2007-1863)
A bug was found in the mod_mem_cache module. On sites where caching is
enabled using this module, an information leak could occur which
revealed portions of sensitive memory to remote users. (CVE-2007-1862)
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.0
Family: Fedora Local Security Checks
Nessus Plugin ID: 27675 (fedora_2007-0704.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now