openSUSE Security Update : apache2 (openSUSE-SU-2012:0248-1)

Medium Nessus Plugin ID 75427


The remote openSUSE host is missing a security update.


This update fixes several security issues in the Apache2 webserver.

CVE-2011-3368, CVE-2011-4317: This update also includes several fixes for a mod_proxy reverse exposure via RewriteRule or ProxyPassMatch directives.

CVE-2011-3607: Integer overflow in ap_pregsub function resulting in a heap based buffer overflow could potentially allow local attackers to gain privileges

In addition to that the following changes were made :

- new template file:
/etc/apache2/vhosts.d/vhost-ssl.template allow TLSv1 only, browser match stuff commented out.

- rc script /etc/init.d/apache2: handle reload with deleted binaries by message to stdout only, but refrain from sending signals.

- httpd-2.2.x-bnc727071-mod_authnz_ldap-utf8.diff: make non-ascii eg UTF8 passwords work with mod_authnz_ldap.


Update the affected apache2 packages.

See Also

Plugin Details

Severity: Medium

ID: 75427

File Name: suse_11_3_apache2-111205.nasl

Version: $Revision: 1.3 $

Type: local

Agent: unix

Published: 2014/06/13

Modified: 2015/07/14

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:apache2, p-cpe:/a:novell:opensuse:apache2-devel, p-cpe:/a:novell:opensuse:apache2-example-certificates, p-cpe:/a:novell:opensuse:apache2-example-pages, p-cpe:/a:novell:opensuse:apache2-itk, p-cpe:/a:novell:opensuse:apache2-prefork, p-cpe:/a:novell:opensuse:apache2-utils, p-cpe:/a:novell:opensuse:apache2-worker, cpe:/o:novell:opensuse:11.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/12/05

Reference Information

CVE: CVE-2011-3368, CVE-2011-3607, CVE-2011-4317

OSVDB: 76079, 76744, 77310