FreeBSD : apache2 -- SSL remote DoS (7b81fc47-239f-11d9-814e-0001020eed82)

Medium Nessus Plugin ID 37076


The remote FreeBSD host is missing a security-related update.


The Apache HTTP Server 2.0.51 release notes report that the following issues have been fixed :

A segfault in mod_ssl which can be triggered by a malicious remote server, if proxying to SSL servers has been configured.

A potential infinite loop in mod_ssl which could be triggered given particular timing of a connection abort. [CAN-2004-0748]


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 37076

File Name: freebsd_pkg_7b81fc47239f11d9814e0001020eed82.nasl

Version: $Revision: 1.15 $

Type: local

Published: 2009/04/23

Modified: 2016/12/08

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apache, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 2004/10/21

Vulnerability Publication Date: 2004/07/07

Reference Information

CVE: CVE-2004-0748, CVE-2004-0751

BID: 11094, 11154