Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA135] DSA-135-1 libapache-mod-ssl


Vulnerability Assessment Details

[DSA135] DSA-135-1 libapache-mod-ssl

Vulnerability Assessment Summary
DSA-135-1 libapache-mod-ssl

Detailed Explanation for this Vulnerability Assessment

The libapache-mod-ssl package provides SSL capability to the apache
webserver.
Recently, a problem has been found in the handling of .htaccess files,
permiting arbitrary code execution as the web server user (regardless of
ExecCGI / suexec settings), DoS attacks (killing off apache children), and
permiting someone to take control of apache child processes - all through
specially crafted .htaccess files.
This has been fixed in the libapache-mod-ssl_2.4.10-1.3.9-1potato2 package
(for potato), and the libapache-mod-ssl_2.8.9-2 package (for woody).
We recommend you upgrade as soon as possible.


Solution : http://www.debian.org/security/2002/dsa-135
Network Security Threat Level: High

Networks Security ID: 5084

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Dell Precision Workstation T7400 CPU Copper Cooling Heatsink FD841 + 4 screws
$17.0
Dell Precision Workstation T7400 CPU Copper Cooling Heatsink FD841 + 4 screws pictureMobile Intel Pentium III Processor BXM80526B800256 SL4PR
$29.99
Mobile Intel Pentium III Processor BXM80526B800256 SL4PR pictureG41 Desktop Main Board LGA775 Quad-core E5430 Set 2.66G CPU + 4G Memory + FanXG
$101.18
G41 Desktop Main Board LGA775 Quad-core E5430 Set 2.66G CPU + 4G Memory + FanXG picture


Discussions

No Discussions have been posted on this vulnerability.