FreeBSD : apache -- http request smuggling (651996e0-fe07-11d9-8329-000e0c2e438a)

Medium Nessus Plugin ID 19346

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

A Watchfire whitepaper reports an vulnerability in the Apache webserver. The vulnerability can be exploited by malicious people causing cross site scripting, web cache poisoining, session hijacking and most importantly the ability to bypass web application firewall protection. Exploiting this vulnerability requires multiple carefully crafted HTTP requests, taking advantage of an caching server, proxy server, web application firewall etc. This only affects installations where Apache is used as HTTP proxy in combination with the following web servers :

- IIS/6.0 and 5.0

- Apache 2.0.45 (as web server)

- apache 1.3.29

- WebSphere 5.1 and 5.0

- WebLogic 8.1 SP1

- Oracle9iAS web server 9.0.2

- SunONE web server 6.1 SP4

Solution

Update the affected packages.

See Also

http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf

http://www.nessus.org/u?03ca4f0d

Plugin Details

Severity: Medium

ID: 19346

File Name: freebsd_pkg_651996e0fe0711d98329000e0c2e438a.nasl

Version: 1.19

Type: local

Published: 2005/08/01

Updated: 2018/12/05

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apache, p-cpe:/a:freebsd:freebsd:apache+ipv6, p-cpe:/a:freebsd:freebsd:apache+mod_perl, p-cpe:/a:freebsd:freebsd:apache+mod_ssl, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+ipv6, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_accel, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_accel+ipv6, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_accel+mod_deflate, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_accel+mod_deflate+ipv6, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_deflate, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_deflate+ipv6, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_snmp, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_snmp+mod_accel, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_snmp+mod_accel+ipv6, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_snmp+mod_deflate, p-cpe:/a:freebsd:freebsd:apache+mod_ssl+mod_snmp+mod_deflate+ipv6, p-cpe:/a:freebsd:freebsd:apache+ssl, p-cpe:/a:freebsd:freebsd:apache_fp, p-cpe:/a:freebsd:freebsd:ru-apache, p-cpe:/a:freebsd:freebsd:ru-apache+mod_ssl, cpe:/o:freebsd:freebsd

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2005/07/26

Vulnerability Publication Date: 2005/07/25

Reference Information

CVE: CVE-2005-2088

BID: 14106