RHEL 2.1 : apache (RHSA-2006:0158)

Medium Nessus Plugin ID 20733


The remote Red Hat host is missing one or more security updates.


Updated Apache httpd packages that correct a security issue are now available for Red Hat Enterprise Linux 2.1.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The Apache HTTP Server is a popular and freely-available Web server.

A flaw in mod_imap when using the Referer directive with image maps was discovered. With certain site configurations, a remote attacker could perform a cross-site scripting attack if a victim can be forced to visit a malicious URL using certain web browsers. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-3352 to this issue.

Users of apache should upgrade to these updated packages, which contain a backported patch to correct this issue.


Update the affected apache, apache-devel and / or apache-manual packages.

See Also



Plugin Details

Severity: Medium

ID: 20733

File Name: redhat-RHSA-2006-0158.nasl

Version: $Revision: 1.19 $

Type: local

Agent: unix

Published: 2006/01/17

Modified: 2016/12/29

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:apache, p-cpe:/a:redhat:enterprise_linux:apache-devel, p-cpe:/a:redhat:enterprise_linux:apache-manual, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 2006/01/17

Vulnerability Publication Date: 2005/12/13

Reference Information

CVE: CVE-2005-3352

BID: 15834

OSVDB: 21705

RHSA: 2006:0158