NewStart CGSL MAIN 6.06 : httpd Multiple Vulnerabilities (NS-SA-2025-0240)

critical Nessus Plugin ID 297071

Synopsis

The remote NewStart CGSL host is affected by multiple vulnerabilities.

Description

The remote NewStart CGSL host, running version MAIN 6.06, has httpd packages installed that are affected by multiple vulnerabilities:

- Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions. (CVE-2022-23943)

- The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass RequestHeader unset directives by placing a header in the trailer portion of data sent with chunked transfer coding.
NOTE: the vendor states this is not a security issue in httpd as such. (CVE-2013-5704)

- The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header. (CVE-2014-3581)

- The handle_headers function in mod_proxy_fcgi.c in the mod_proxy_fcgi module in the Apache HTTP Server 2.4.10 allows remote FastCGI servers to cause a denial of service (buffer over-read and daemon crash) via long response headers. (CVE-2014-3583)

- mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory. (CVE-2014-8109)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL httpd packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

https://security.gd-linux.com/notice/NS-SA-2025-0240

https://security.gd-linux.com/info/CVE-2013-5704

https://security.gd-linux.com/info/CVE-2014-3581

https://security.gd-linux.com/info/CVE-2014-3583

https://security.gd-linux.com/info/CVE-2014-8109

https://security.gd-linux.com/info/CVE-2016-5387

https://security.gd-linux.com/info/CVE-2016-8740

https://security.gd-linux.com/info/CVE-2017-9798

https://security.gd-linux.com/info/CVE-2022-22719

https://security.gd-linux.com/info/CVE-2022-22720

https://security.gd-linux.com/info/CVE-2022-22721

https://security.gd-linux.com/info/CVE-2022-23943

https://security.gd-linux.com/info/CVE-2024-36387

Plugin Details

Severity: Critical

ID: 297071

File Name: newstart_cgsl_NS-SA-2025-0240_httpd.nasl

Version: 1.1

Type: local

Published: 1/28/2026

Updated: 1/28/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2022-23943

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:zte:cgsl_main:6, p-cpe:/a:zte:cgsl_main:httpd-devel, p-cpe:/a:zte:cgsl_main:httpd-tools, p-cpe:/a:zte:cgsl_main:httpd-filesystem, p-cpe:/a:zte:cgsl_main:httpd, p-cpe:/a:zte:cgsl_main:mod_lua, p-cpe:/a:zte:cgsl_main:httpd-manual, p-cpe:/a:zte:cgsl_main:mod_ssl, p-cpe:/a:zte:cgsl_main:httpd-core

Required KB Items: Host/local_checks_enabled, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/29/2026

Vulnerability Publication Date: 10/19/2013

Reference Information

CVE: CVE-2013-5704, CVE-2014-3581, CVE-2014-3583, CVE-2014-8109, CVE-2016-5387, CVE-2016-8740, CVE-2017-9798, CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943, CVE-2024-36387