Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Web Servers >> Apache 2.0.39 Win32 directory traversal


Vulnerability Assessment Details

Apache 2.0.39 Win32 directory traversal

Vulnerability Assessment Summary
Apache 2.0.39 Win32 directory traversal

Detailed Explanation for this Vulnerability Assessment

A security vulnerability in Apache 2.0.39 on Windows systems
permits attackers to access files that would otherwise be
inaccessible using a directory traversal attack.
A cracker may use this to read sensitive files or even execute
any command on your system.

Solutions:
- Upgrade to Apache 2.0.40
- or install it on a Unix machine
- or add in your httpd.conf, before the first
'Alias' or 'Redirect' directive:
RedirectMatch 400 \\\.\.

Network Security Threat Level: High

Networks Security ID: 5434

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Michel Arboi

Cables, Connectors

NEW Intel Core I7-6700K Unlocked 4.00 GHz 8M Processor Cache 4 LGA 1151
$279.98
NEW Intel Core I7-6700K Unlocked 4.00 GHz 8M Processor Cache 4 LGA 1151 pictureIBM 43X5252 Intel Xeon E5520 Quad-Core 2.26 GHz Processor - L3: 8 MB
$16.24
IBM 43X5252 Intel Xeon E5520 Quad-Core 2.26 GHz Processor - L3: 8 MB pictureHP 17-x008ds Intel N3710 Quad-Core, 8GB, 17.3” Touchscreen LED, Win 10 Notebook
$300.0
HP 17-x008ds Intel N3710 Quad-Core, 8GB, 17.3” Touchscreen LED, Win 10 Notebook  pictureLenovo ThinkStation S30 E5-1620v2 Quad-Core 3.7GHz 8Gb 500Gb K600 Win8.1 x64 #03
$159.95
Lenovo ThinkStation S30 E5-1620v2 Quad-Core 3.7GHz 8Gb 500Gb K600 Win8.1 x64 #03 picture


Discussions

No Discussions have been posted on this vulnerability.