SuSE 11.1 Security Update : Apache2 (SAT Patch Number 5344)

This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.

Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

This update brings Apache to version 2.2.12.

The main reason is the enablement of the Server Name Indication (SNI)
that allows several SSL-enabled domains on one IP address
(FATE#311973). See the SSLStrictSNIVHostCheck directive as documented
in /usr/share/apache2/manual/mod/mod_ssl.html.en

Also the patch for the ByteRange remote denial of service attack
(CVE-2011-3192) was refined and the configuration options used by
upstream were added.

Introduce new config option: Allow MaxRanges Number of ranges
requested, if exceeded, the complete content is served. default: 200
0|unlimited: unlimited none: Range headers are ignored. This option is
a backport from 2.2.21.

Also fixed were

- Denial of service in proxy_ajp when using a undefined
method. (CVE-2011-3348)

- Exposure of internal servers via reverse proxy methods
with mod_proxy enabled and incorrect Rewrite or Proxy
Rules. This update also includes a newer
apache2-vhost-ssl.template, which disables SSLv2, and
allows SSLv3 and strong ciphers only. Please note that
existing vhosts will not be converted. (CVE-2011-3368)

See also :

Solution :

Apply SAT patch number 5344.

Risk factor :

High / CVSS Base Score : 7.8
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 57089 ()

Bugtraq ID:

CVE ID: CVE-2011-3192

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now