Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FreeBSD Local Security Checks >> FreeBSD : apache13-modssl -- format string vulnerability in proxy support (8)


Vulnerability Assessment Details

FreeBSD : apache13-modssl -- format string vulnerability in proxy support (8)

Vulnerability Assessment Summary
Check for apache+mod_ssl+ipv6

Detailed Explanation for this Vulnerability Assessment

The remote host is missing an update to the system

The following package is affected: apache+mod_ssl+ipv6

Solution : Update the package on the remote host
See also :


Networks Security ID: 10736

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Cisco Systems PIX-506E Firewall Security Appliance with Cisco cord
$1.99
Cisco Systems PIX-506E Firewall Security Appliance with Cisco cord pictureCisco Meraki MX80 Cloud Managed Firewall Security Appliance A80-17100-B, TESTED
$50.0
Cisco Meraki MX80 Cloud Managed Firewall Security Appliance A80-17100-B, TESTED pictureWatchGuard WGM47 hardware firewall 19600 Mbit/s 1U
$12988.04
WatchGuard WGM47 hardware firewall 19600 Mbit/s 1U pictureWatchGuard M270 hardware firewall 4900 Mbit/s 1U
$6224.47
WatchGuard M270 hardware firewall 4900 Mbit/s 1U picture


Discussions

No Discussions have been posted on this vulnerability.