Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1000] DSA-1000-2 libapreq2-perl

Vulnerability Assessment Details

[DSA1000] DSA-1000-2 libapreq2-perl

Vulnerability Assessment Summary
DSA-1000-2 libapreq2-perl

Detailed Explanation for this Vulnerability Assessment

Gunnar Wolf noticed that the correction for the following problem was
not complete and requires an update. For completeness we're
providing the original problem description:
An algorithm weakness has been discovered in Apache2::Request, the
generic request library for Apache2 which can be exploited remotely
and cause a denial of service via CPU consumption.
The old stable distribution (woody) does not contain this package.
For the stable distribution (sarge) this problem has been fixed in
version 2.04-dev-1sarge2.
For the unstable distribution (sid) this problem has been fixed in
version 2.07-1.
We recommend that you upgrade your libapreq2, libapache2-mod-apreq2
and libapache2-request-perl packages.

Solution :
Network Security Threat Level: High

Networks Security ID: 16710

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

Lenovo Thinkcentre M73 (500GB, Intel Core i3 4th Gen. 2.9GHz, 4GB) PC Desktop 
Lenovo Thinkcentre M73 (500GB, Intel Core i3 4th Gen. 2.9GHz, 4GB) PC Desktop  pictureOEM Lenovo Flex 2-14 Series 14" Laptop Touchpad Ribbon Cable 450.00X04.0001
OEM Lenovo Flex 2-14 Series 14Lenovo 8" Idea Tab 2 A8-50F 16GB Storage 1GB RAM Android 5.0 Blue
Lenovo 8OEM Lenovo IdeaPad Flex 4-1480 14" Touchpad Cable NBX0001W700
OEM Lenovo IdeaPad Flex 4-1480 14


No Discussions have been posted on this vulnerability.