RHEL 4 : Proxy Server (RHSA-2008:0627)

Medium Nessus Plugin ID 63859

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 3.6


The remote Red Hat host is missing a security update.


Red Hat Network Proxy Server version 5.1.1 is now available. This update includes a fix for a security issue in a Red Hat Network Proxy Server component.

This update has been rated as having low security impact by the Red Hat Security Response Team.

The Red Hat Network Proxy Server 5.1.1 release corrects a security vulnerability in a shipped component. In a typical operating environment, this component is not exposed to users of Proxy Server in a vulnerable manner. This security update will reduce risk in unique Proxy Server environments.

A flaw was found in the mod_perl 'ModPerl::RegistryCooker' class. If a server implemented a mod_perl registry module using the 'namespace_from_uri' method, a remote attacker requesting a carefully crafted URI can cause resource consumption, which could lead to a denial of service. (CVE-2007-1349)

Users of Red Hat Network Proxy Server 5.1 are advised to upgrade to 5.1.1, which resolves this issue.


Update the affected mod_perl package.

See Also



Plugin Details

Severity: Medium

ID: 63859

File Name: redhat-RHSA-2008-0627.nasl

Version: 1.8

Type: local

Agent: unix

Published: 2013/01/24

Updated: 2021/01/14

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 3.6

CVSS v2.0

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:mod_perl, cpe:/o:redhat:enterprise_linux:4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2008/08/13

Reference Information

CVE: CVE-2007-1349

RHSA: 2008:0627

CWE: 399