FreeBSD : apache2 -- SSL remote DoS (7b81fc47-239f-11d9-814e-0001020eed82)

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The Apache HTTP Server 2.0.51 release notes report that the following
issues have been fixed :

A segfault in mod_ssl which can be triggered by a malicious remote
server, if proxying to SSL servers has been configured.
[CAN-2004-0751]

A potential infinite loop in mod_ssl which could be triggered given
particular timing of a connection abort. [CAN-2004-0748]

See also :

http://marc.info/?l=apache-httpd-announce&m=109527608022322
http://www.nessus.org/u?7cb8787c

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 3.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 37076 (freebsd_pkg_7b81fc47239f11d9814e0001020eed82.nasl)

Bugtraq ID: 11094
11154

CVE ID: CVE-2004-0748
CVE-2004-0751

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now