Fedora 8 : httpd-2.2.8-1.fc8 (2008-1695)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

This update includes the latest release of httpd 2.2, which fixes a
number of minor security issues and other bugs. A flaw was found in
the mod_imagemap module. On sites where mod_imagemap was enabled and
an imagemap file was publicly available, a cross-site scripting attack
was possible. (CVE-2007-5000) A flaw was found in the mod_status
module. On sites where mod_status was enabled and the status pages
were publicly accessible, a cross-site scripting attack was possible.
(CVE-2007-6388) A flaw was found in the mod_proxy_balancer module. On
sites where mod_proxy_balancer was enabled, a cross-site scripting
attack against an authorized user was possible. (CVE-2007-6421) A flaw
was found in the mod_proxy_balancer module. On sites where
mod_proxy_balancer was enabled, an authorized user could send a
carefully crafted request that would cause the Apache child process
handling that request to crash. This could lead to a denial of service
if using a threaded Multi-Processing Module. (CVE-2007-6422) A flaw
was found in the mod_proxy_ftp module. On sites where mod_proxy_ftp
was enabled and a forward proxy was configured, a cross-site scripting
attack was possible against browsers which do not correctly derive the
response character set following the rules in RFC 2616.
(CVE-2008-0005)

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=419931
https://bugzilla.redhat.com/show_bug.cgi?id=427228
https://bugzilla.redhat.com/show_bug.cgi?id=427229
https://bugzilla.redhat.com/show_bug.cgi?id=427230
https://bugzilla.redhat.com/show_bug.cgi?id=427739
http://www.nessus.org/u?7580974d

Solution :

Update the affected httpd package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 31103 (fedora_2008-1695.nasl)

Bugtraq ID: 26838
27234
27236
27237

CVE ID: CVE-2007-5000
CVE-2007-6388
CVE-2007-6421
CVE-2007-6422
CVE-2008-0005

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now