Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-349: httpd


Vulnerability Assessment Details

RHSA-2004-349: httpd

Vulnerability Assessment Summary
Check for the version of the httpd packages

Detailed Explanation for this Vulnerability Assessment


Updated httpd packages that include a security fix for mod_ssl and various
enhancements are now available.

The Apache HTTP server is a powerful, full-featured, efficient, and
freely-available Web server.

An input filter bug in mod_ssl was discovered in Apache httpd version
2.0.50 and earlier. A remote attacker could force an SSL connection to be
aborted in a particular state and cause an Apache child process to enter an
infinite loop, consuming CPU resources. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0748 to
this issue.

Additionally, this update includes the following enhancements and bug
fixes:

- included an improved version of the mod_cgi module that correctly handles
concurrent output on stderr and stdout

- included support for direct lookup of SSL variables using %{SSL:...}
from mod_rewrite, or using %{...}s from mod_headers

- restored support for use of SHA1-encoded passwords

- added the mod_ext_filter module

Users of the Apache HTTP server should upgrade to these updated packages,
which contain backported patches that address these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2004-349.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Dell PowerEdge R720 2x E5-2690 v2 3.0Ghz 10 Core 192GB 8x Trays H710
$5800.0
Dell PowerEdge R720 2x E5-2690 v2 3.0Ghz 10 Core 192GB 8x Trays H710 pictureDell PowerEdge R720xd 2x E5-2650 v2 2.6GHz 8 Core 32GB 12x 600GB 15K SAS H710P
$5175.0
Dell PowerEdge R720xd 2x E5-2650 v2 2.6GHz 8 Core 32GB 12x 600GB 15K SAS H710P pictureDell PowerEdge R720 2x E5-2650 v2 2.6Ghz 8 Core 96GB 8x 300GB 15K SAS H710
$3391.0
Dell PowerEdge R720 2x E5-2650 v2 2.6Ghz 8 Core 96GB 8x 300GB 15K SAS H710 picture128GB (32x4GB) DDR2 PC2-5300P 667 Server Memory RAM Dell PowerEdge R905 Upgrade
$124.98
128GB (32x4GB) DDR2 PC2-5300P 667 Server Memory RAM Dell PowerEdge R905 Upgrade picture


Discussions

No Discussions have been posted on this vulnerability.