RHEL 3 / 4 : Proxy Server (RHSA-2008:0523)

high Nessus Plugin ID 63857
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 5.5


The remote Red Hat host is missing one or more security updates.


Red Hat Network Proxy Server version 4.2.3 is now available. This update includes fixes for a number of security issues in Red Hat Network Proxy Server components.

This update has been rated as having low security impact by the Red Hat Security Response Team.

The Red Hat Network Proxy Server 4.2.3 release corrects several security vulnerabilities in several shipped components. In a typical operating environment, these components are not exposed to users of Proxy Server in a vulnerable manner. These security updates will reduce risk in unique Proxy Server environments.

Multiple flaws were fixed in the Apache HTTPD server. These flaws could result in a cross-site scripting or denial-of-service attack.
(CVE-2007-6388, CVE-2007-5000, CVE-2007-4465, CVE-2007-3304, CVE-2006-5752, CVE-2006-3918, CVE-2005-3352)

A denial-of-service flaw was fixed in mod_perl. (CVE-2007-1349)

Multiple flaws in mod_ssl. (CVE-2004-0488, CVE-2004-0700, CVE-2004-0885)

A denial-of-service flaw was fixed in the jabberd server.

Users of Red Hat Network Proxy Server 4.2 are advised to upgrade to 4.2.3, which resolves these issues.


Update the affected jabberd, rhn-apache and / or rhn-modperl packages.

See Also














Plugin Details

Severity: High

ID: 63857

File Name: redhat-RHSA-2008-0523.nasl

Version: 1.11

Type: local

Agent: unix

Published: 1/24/2013

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: High

VPR Score: 5.5

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:jabberd, p-cpe:/a:redhat:enterprise_linux:rhn-apache, p-cpe:/a:redhat:enterprise_linux:rhn-modperl, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 6/30/2008

Reference Information

CVE: CVE-2004-0488, CVE-2004-0700, CVE-2004-0885, CVE-2005-3352, CVE-2006-1329, CVE-2006-3918, CVE-2006-5752, CVE-2007-1349, CVE-2007-3304, CVE-2007-4465, CVE-2007-5000, CVE-2007-6388

RHSA: 2008:0523

CWE: 79, 399