Scientific Linux Security Update : httpd on SL5.x, SL6.x i386/x86_64

Medium Nessus Plugin ID 66441


The remote Scientific Linux host is missing one or more security updates.


Cross-site scripting (XSS) flaws were found in the mod_proxy_balancer module's manager web interface. If a remote attacker could trick a user, who was logged into the manager web interface, into visiting a specially- crafted URL, it would lead to arbitrary web script execution in the context of the user's manager interface session.

It was found that mod_rewrite did not filter terminal escape sequences from its log file. If mod_rewrite was configured with the RewriteLog directive, a remote attacker could use specially crafted HTTP requests to inject terminal escape sequences into the mod_rewrite log file. If a victim viewed the log file with a terminal emulator, it could result in arbitrary command execution with the privileges of that user.

Cross-site scripting (XSS) flaws were found in the mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An attacker could possibly use these flaws to perform XSS attacks if they were able to make the victim's browser generate an HTTP request with a specially crafted Host header. (CVE-2012-3499)

After installing the updated packages, the httpd daemon will be restarted automatically.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 66441

File Name: sl_20130513_httpd_on_SL5_x.nasl

Version: $Revision: 1.12 $

Type: local

Agent: unix

Published: 2013/05/15

Modified: 2014/08/16

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2013/05/13

Reference Information

CVE: CVE-2012-3499, CVE-2012-4558, CVE-2013-1862