FreeBSD : apache24 -- several vulnerabilities (5804b9d4-a959-11e4-9363-20cf30e32f6d)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Apache HTTP SERVER PROJECT reports : mod_proxy_fcgi: Fix a potential
crash due to buffer over-read, with response headers' size above 8K.

mod_cache: Avoid a crash when Content-Type has an empty value. PR
56924.

mod_lua: Fix handling of the Require line when a LuaAuthzProvider is
used in multiple Require directives with different arguments. PR57204.

core: HTTP trailers could be used to replace HTTP headers late during
request processing, potentially undoing or otherwise confusing modules
that examined or modified request headers earlier. Adds
'MergeTrailers' directive to restore legacy behavior.

See also :

http://www.nessus.org/u?b50c7636

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 81116 ()

Bugtraq ID:

CVE ID: CVE-2013-5704
CVE-2014-3581
CVE-2014-3583
CVE-2014-8109

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now