SUSE SLES10 Security Update : apache2 (SUSE-SU-2013:0469-1)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

This Apache2 LTSS roll-up update for SUSE Linux Enterprise 10 SP3 LTSS
fixes the following security issues and bugs :

- CVE-2012-4557: Denial of Service via special requests in
mod_proxy_ajp

- CVE-2012-0883: improper LD_LIBRARY_PATH handling

- CVE-2012-2687: filename escaping problem

- CVE-2012-0031: Fixed a scoreboard corruption (shared mem
segment) by child causes crash of privileged parent
(invalid free()) during shutdown.

- CVE-2012-0053: Fixed an issue in error responses that
could expose 'httpOnly' cookies when no custom
ErrorDocument is specified for status code 400'.

- The SSL configuration template has been adjusted not to
suggested weak ciphers CVE-2007-6750: The
'mod_reqtimeout' module was backported from Apache
2.2.21 to help mitigate the 'Slowloris' Denial of
Service attack.

You need to enable the 'mod_reqtimeout' module in your
existing apache configuration to make it effective, e.g.
in the APACHE_MODULES line in /etc/sysconfig/apache2.

- CVE-2011-3639, CVE-2011-3368, CVE-2011-4317: This update
also includes several fixes for a mod_proxy reverse
exposure via RewriteRule or ProxyPassMatch directives.

- CVE-2011-1473: Fixed the SSL renegotiation DoS by
disabling renegotiation by default.

- CVE-2011-3607: Integer overflow in ap_pregsub function
resulting in a heap-based buffer overflow could
potentially allow local attackers to gain privileges

Additionally, some non-security bugs have been fixed which are listed
in the changelog file.

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.nessus.org/u?216a63aa
http://support.novell.com/security/cve/CVE-2012-0021.html
http://support.novell.com/security/cve/CVE-2012-0883.html
http://support.novell.com/security/cve/CVE-2012-2687.html
http://support.novell.com/security/cve/CVE-2012-4557.html
https://bugzilla.novell.com/688472
https://bugzilla.novell.com/719236
https://bugzilla.novell.com/722545
https://bugzilla.novell.com/727071
https://bugzilla.novell.com/727993
https://bugzilla.novell.com/729181
https://bugzilla.novell.com/736706
https://bugzilla.novell.com/738855
https://bugzilla.novell.com/741243
https://bugzilla.novell.com/743743
https://bugzilla.novell.com/757710
https://bugzilla.novell.com/777260
http://www.nessus.org/u?64e1fdd5

Solution :

Update the affected apache2 packages

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.4
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now