Debian dla-4452 : apache2 - security update

high Nessus Plugin ID 296510

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4452 advisory.

- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4452-1 [email protected] https://www.debian.org/lts/security/ Bastien Roucaris January 24, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : apache2 Version : 2.4.66-1~deb11u1 CVE ID : CVE-2025-55753 CVE-2025-58098 CVE-2025-59775 CVE-2025-65082 CVE-2025-66200 Debian Bug : 1121926

Multiple vulnerabilities were fixed for apache httpd a popular webserver.

CVE-2025-55753

An integer overflow was found in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds

CVE-2025-58098

Apache with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=... directives.

CVE-2025-59775

A Server-Side Request Forgery (SSRF) vulnerability was found in Apache HTTP Server on Windows with AllowEncodedSlashes On and MergeSlashes Off allows to potentially leak NTLM hashes to a malicious server via SSRF

CVE-2025-65082

An Improper Neutralization of Escape, Meta, or Control Sequences vulnerability was found in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

CVE-2025-66200

An mod_userdir+suexec bypass, via AllowOverride FileInfo vulnerability was found in Apache HTTP Server.
Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.

For Debian 11 bullseye, these problems have been fixed in version 2.4.66-1~deb11u1.

We recommend that you upgrade your apache2 packages.

For the detailed security status of apache2 please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/apache2

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the apache2 packages.

See Also

https://security-tracker.debian.org/tracker/source-package/apache2

https://packages.debian.org/source/bullseye/apache2

https://security-tracker.debian.org/tracker/CVE-2025-55753

https://security-tracker.debian.org/tracker/CVE-2025-58098

https://security-tracker.debian.org/tracker/CVE-2025-65082

https://security-tracker.debian.org/tracker/CVE-2025-66200

https://security-tracker.debian.org/tracker/CVE-2025-59775

Plugin Details

Severity: High

ID: 296510

File Name: debian_DLA-4452.nasl

Version: 1.1

Type: local

Agent: unix

Published: 1/24/2026

Updated: 1/24/2026

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: High

Base Score: 8.7

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:P

CVSS Score Source: CVE-2025-58098

CVSS v3

Risk Factor: High

Base Score: 8.3

Temporal Score: 7.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:apache2, p-cpe:/a:debian:debian_linux:apache2-doc, p-cpe:/a:debian:debian_linux:apache2-suexec-custom, p-cpe:/a:debian:debian_linux:apache2-utils, p-cpe:/a:debian:debian_linux:apache2-bin, p-cpe:/a:debian:debian_linux:apache2-data, p-cpe:/a:debian:debian_linux:apache2-dev, p-cpe:/a:debian:debian_linux:apache2-suexec-pristine, p-cpe:/a:debian:debian_linux:libapache2-mod-proxy-uwsgi, p-cpe:/a:debian:debian_linux:apache2-ssl-dev, p-cpe:/a:debian:debian_linux:libapache2-mod-md

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 1/24/2026

Vulnerability Publication Date: 12/4/2025

Reference Information

CVE: CVE-2025-55753, CVE-2025-58098, CVE-2025-59775, CVE-2025-65082, CVE-2025-66200

IAVA: 2025-A-0889