SuSE 11.3 Security Update : apache2 (SAT Patch Number 10533)

medium Nessus Plugin ID 82657
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

The Apache2 webserver was updated to fix various issues.

The following feature was added :

- Provide support for the tunneling of web socket connections to a backend websockets server.
(FATE#316880) The following security issues have been fixed :

- The mod_headers module in the Apache HTTP Server 2.2.22 allowed remote attackers to bypass 'RequestHeader unset' directives by placing a header in the trailer portion of data sent with chunked transfer coding. The fix also adds a 'MergeTrailers' directive to restore legacy behavior. (CVE-2013-5704)

- The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header. (CVE-2014-3581)

- Apache HTTP Server allowed remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID). We so far assumed that this not useful to attackers, the fix is basically just reducing potential information leaks.
(CVE-2003-1418)

The following bugs have been fixed :

- Treat the 'server unavailable' condition as a transient error with all LDAP SDKs. (bsc#904427)

- Fixed a segmentation fault at startup if the certs are shared across > 1 server_rec. (bsc#907339)

Solution

Apply SAT patch number 10533.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=713970

https://bugzilla.novell.com/show_bug.cgi?id=871310

https://bugzilla.novell.com/show_bug.cgi?id=899836

https://bugzilla.novell.com/show_bug.cgi?id=904427

https://bugzilla.novell.com/show_bug.cgi?id=907339

https://bugzilla.novell.com/show_bug.cgi?id=907477

http://support.novell.com/security/cve/CVE-2003-1418.html

http://support.novell.com/security/cve/CVE-2013-5704.html

http://support.novell.com/security/cve/CVE-2014-3581.html

Plugin Details

Severity: Medium

ID: 82657

File Name: suse_11_apache2-150325.nasl

Version: 1.5

Type: local

Agent: unix

Published: 4/9/2015

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 4.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:apache2, p-cpe:/a:novell:suse_linux:11:apache2-doc, p-cpe:/a:novell:suse_linux:11:apache2-example-pages, p-cpe:/a:novell:suse_linux:11:apache2-prefork, p-cpe:/a:novell:suse_linux:11:apache2-utils, p-cpe:/a:novell:suse_linux:11:apache2-worker, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 3/25/2015

Reference Information

CVE: CVE-2003-1418, CVE-2013-5704, CVE-2014-3581

CWE: 200