Slackware 10.0 / 10.1 / 10.2 / 8.1 / 9.0 / 9.1 / current : apache (SSA:2005-310-04)

Medium Nessus Plugin ID 20151


The remote Slackware host is missing a security update.


New apache packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix potential security issues: * If a request contains both Transfer-Encoding and Content-Length headers, remove the Content-Length, mitigating some HTTP Request Splitting/Spoofing attacks. * Added TraceEnable [on|off|extended] per-server directive to alter the behavior of the TRACE method. It's hard to say how much real-world impact these have, as there's no more information about that in the announcement. The original Apache announement can be read here: Note that if you use mod_ssl, you will also need a new mod_ssl package. These have been provided for the same releases of Slackware.


Update the affected apache and / or mod_ssl packages.

See Also

Plugin Details

Severity: Medium

ID: 20151

File Name: Slackware_SSA_2005-310-04.nasl

Version: 1.12

Type: local

Published: 2005/11/07

Updated: 2018/08/09

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:apache, p-cpe:/a:slackware:slackware_linux:mod_ssl, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:10.0, cpe:/o:slackware:slackware_linux:10.1, cpe:/o:slackware:slackware_linux:10.2, cpe:/o:slackware:slackware_linux:8.1, cpe:/o:slackware:slackware_linux:9.0, cpe:/o:slackware:slackware_linux:9.1

Patch Publication Date: 2005/11/06

Vulnerability Publication Date: 2005/05/26

Reference Information

CVE: CVE-2005-2088

SSA: 2005-310-04