Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Web Servers >> Apache Error Log Escape Sequence Injection


Vulnerability Assessment Details

Apache Error Log Escape Sequence Injection

Vulnerability Assessment Summary
Checks for Apache Error Log Escape Sequence Injection Vulnerability

Detailed Explanation for this Vulnerability Assessment

The target is running an Apache web server which permits for the
injection of arbitrary escape sequences into its error logs. An
attacker might use this vulnerability in an attempt to exploit similar
vulnerabilities in terminal emulators.

***** Nessus has acertaind the vulnerability exists only by looking at
***** the Server header returned by the web server running on the target.

Solution : Upgrade to Apache version 1.3.31 or 2.0.49 or newer.
Network Security Threat Level: Low

Networks Security ID: 9930

Vulnerability Assessment Copyright: This script is Copyright (C) 2004-2006 George A. Theall

Cables, Connectors

Vintage 1981 Atari 400 The Educator Owner's Guide Brochure booklet pamphlet
$7.95
Vintage 1981 Atari 400 The Educator Owner's Guide Brochure booklet pamphlet  pictureATARI Anniversary Edition PC CD-ROM Software & Booklet
$9.99
ATARI Anniversary Edition PC CD-ROM Software & Booklet pictureVintage Atari Power Adapter 9v Unused in Original Box
$19.99
Vintage Atari Power Adapter 9v Unused in Original Box picture1984 Apple Macintosh Care Repair Manual for 128K Mac + Kaypro Atari 520ST IBM PC
$29.99
1984 Apple Macintosh Care Repair Manual for 128K Mac + Kaypro Atari 520ST IBM PC picture


Discussions

No Discussions have been posted on this vulnerability.