Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA133] DSA-133-1 apache-perl


Vulnerability Assessment Details

[DSA133] DSA-133-1 apache-perl

Vulnerability Assessment Summary
DSA-133-1 apache-perl

Detailed Explanation for this Vulnerability Assessment

Mark Litchfield found a denial of service attack in the Apache
web-server. While investigating the problem the Apache Software
Foundation discovered that the code for handling invalid requests which
use chunked encoding also might permit arbitrary code execution.
This has been fixed in version 1.3.9-14.1-1.21.20000309-1 of the Debian
apache-perl package and we recommend that you upgrade your apache-perl
package immediately.
An update for the soon to be released Debian GNU/Linux 3.0/woody
distribution will be available soon.


Solution : http://www.debian.org/security/2002/dsa-133
Network Security Threat Level: High

Networks Security ID: 5033

Vulnerability Assessment Copyright: This script is (C) 2006 Michel Arboi

Cables, Connectors

HP 605312-071 - 4GB PC3L-10600R ECC REG DDR3 1333MHz Server RAM
$12.0
HP 605312-071 -  4GB PC3L-10600R ECC REG DDR3 1333MHz Server RAM picture16GB (1x16GB) 2Rx4 PC3L-10600R Server RAM
$85.0
16GB (1x16GB) 2Rx4 PC3L-10600R Server RAM pictureHP Proliant DL360 G7, 2 *Intel X5650 (2.66GHz/6core) 32GB RAM, 1* 146GB HD, 1AC
$165.0
HP Proliant DL360 G7, 2 *Intel X5650 (2.66GHz/6core) 32GB RAM, 1* 146GB HD, 1AC pictureHP Proliant DL360 G7, 2 *Intel X5650 (2.66GHz/6core) 20GB RAM, 1* 146GB HD, 1AC
$195.0
HP Proliant DL360 G7, 2 *Intel X5650 (2.66GHz/6core) 20GB RAM, 1* 146GB HD, 1AC picture


Discussions

No Discussions have been posted on this vulnerability.