Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 1 2004-203: httpd


Vulnerability Assessment Details

Fedora Core 1 2004-203: httpd

Vulnerability Assessment Summary
Check for the version of the httpd package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2004-203 (httpd).

Apache is a powerful, full-featured, efficient, and freely-available
Web server. Apache is also the most popular Web server on the
Internet.

Update Information:

This update includes the latest stable release of Apache httpd 2.0,
including security fixes for a remotely triggerable memory leak
(CVE CVE-2004-0493), and a buffer overflow in mod_ssl which can be
triggered only by a (trusted) client certificate with a long subject
DN field (CVE CVE-2004-0488).



Solution : http://www.fedoranews.org/updates/FEDORA-2004-203.shtml
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

DIAMOND Multimedia Stealth 64 DRAM T PCI Video Graphics Card Vintage
$9.0
DIAMOND Multimedia Stealth 64 DRAM T PCI Video Graphics Card Vintage picturePC Concepts Keyboard Model KWD-203 61595 5 Pin Clicky Vintage
$29.99
PC Concepts Keyboard Model KWD-203 61595 5 Pin Clicky Vintage pictureVtg PC Concepts KB-6001 HQK BITS6001 Keyboard Clicky English Arabic Wired 5 Pin
$24.99
Vtg PC Concepts KB-6001 HQK BITS6001 Keyboard Clicky English Arabic Wired 5 Pin picture


Discussions

No Discussions have been posted on this vulnerability.