Scientific Linux Security Update : httpd on SL4.x i386/x86_64

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

CVE-2010-0434 httpd: request header information leak

A use-after-free flaw was discovered in the way the Apache HTTP Server
handled request headers in subrequests. In configurations where
subrequests are used, a multithreaded MPM (Multi-Processing Module)
could possibly leak information from other requests in request
replies. (CVE-2010-0434)

This update also fixes the following bug :

- a bug was found in the mod_dav module. If a PUT request
for an existing file failed, that file would be
unexpectedly deleted and a 'Could not get next bucket
brigade' error logged. With this update, failed PUT
requests no longer cause mod_dav to delete files, which
resolves this issue. (BZ#572932)

As well, this update adds the following enhancement :

- with the updated openssl packages from RHSA-2010:0163
installed, mod_ssl will refuse to renegotiate a TLS/SSL
connection with an unpatched client that does not
support RFC 5746. This update adds the
'SSLInsecureRenegotiation' configuration directive. If
this directive is enabled, mod_ssl will renegotiate
insecurely with unpatched clients. (BZ#575805)

Refer to the following Red Hat Knowledgebase article for more details
about the changed mod_ssl behavior:

After installing the updated packages, the httpd daemon must be
restarted for the update to take effect.

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60753 ()

Bugtraq ID:

CVE ID: CVE-2010-0434

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now