Debian DSA-803-1 : apache - programming error

Medium Nessus Plugin ID 19610

Synopsis

The remote Debian host is missing a security-related update.

Description

A vulnerability has been discovered in the Apache web server. When it is acting as an HTTP proxy, it allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct cross-site scripting attacks, which causes Apache to incorrectly handle and forward the body of the request.

The fix for this bug is contained in the apache-common package which means that there isn't any need for a separate update of the apache-perl and apache-ssl package.

Solution

Upgrade the Apache package.

For the old stable distribution (woody) this problem has been fixed in version 1.3.26-0woody7.

For the stable distribution (sarge) this problem has been fixed in version 1.3.33-6sarge1.

See Also

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322607

http://www.debian.org/security/2005/dsa-803

Plugin Details

Severity: Medium

ID: 19610

File Name: debian_DSA-803.nasl

Version: 1.17

Type: local

Agent: unix

Published: 2005/09/12

Updated: 2018/08/09

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:apache, cpe:/o:debian:debian_linux:3.0, cpe:/o:debian:debian_linux:3.1

Patch Publication Date: 2005/09/08

Vulnerability Publication Date: 2005/06/06

Reference Information

CVE: CVE-2005-2088

DSA: 803