CentOS 3 / 4 / 5 : httpd (CESA-2008:0967)

medium Nessus Plugin ID 37062

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated httpd packages that resolve several security issues and fix a bug are now available for Red Hat Enterprise Linux 3, 4 and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The Apache HTTP Server is a popular Web server.

A flaw was found in the mod_proxy Apache module. An attacker in control of a Web server to which requests were being proxied could have caused a limited denial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)

A flaw was found in the mod_proxy_ftp Apache module. If Apache was configured to support FTP-over-HTTP proxying, a remote attacker could have performed a cross-site scripting attack. (CVE-2008-2939)

In addition, these updated packages fix a bug found in the handling of the 'ProxyRemoteMatch' directive in the Red Hat Enterprise Linux 4 httpd packages. This bug is not present in the Red Hat Enterprise Linux 3 or Red Hat Enterprise Linux 5 packages.

Users of httpd should upgrade to these updated packages, which contain backported patches to correct these issues.

Solution

Update the affected httpd packages.

See Also

http://www.nessus.org/u?cf4faef4

http://www.nessus.org/u?c5584c31

http://www.nessus.org/u?c5c64772

http://www.nessus.org/u?300b95f6

http://www.nessus.org/u?1b4b12b1

http://www.nessus.org/u?ac57a22a

http://www.nessus.org/u?01627d34

http://www.nessus.org/u?dcfed5a6

Plugin Details

Severity: Medium

ID: 37062

File Name: centos_RHSA-2008-0967.nasl

Version: 1.18

Type: local

Agent: unix

Published: 4/23/2009

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:centos:centos:httpd, p-cpe:/a:centos:centos:httpd-devel, p-cpe:/a:centos:centos:httpd-manual, p-cpe:/a:centos:centos:httpd-suexec, p-cpe:/a:centos:centos:mod_ssl, cpe:/o:centos:centos:3, cpe:/o:centos:centos:4, cpe:/o:centos:centos:5

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/14/2008

Vulnerability Publication Date: 6/13/2008

Reference Information

CVE: CVE-2008-2364, CVE-2008-2939

BID: 29653, 30560

CWE: 399, 79

RHSA: 2008:0967