|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN177-1 : apache2, libapache-mod-ssl vulnerabilities Vulnerability Assessment Details
|
USN177-1 : apache2, libapache-mod-ssl vulnerabilities |
||
apache2, libapache-mod-ssl vulnerabilities Detailed Explanation for this Vulnerability Assessment Summary : These remote packages are missing security patches : - apache2 - apache2-common - apache2-doc - apache2-mpm-perchild - apache2-mpm-prefork - apache2-mpm-threadpool - apache2-mpm-worker - apache2-prefork-dev - apache2-threaded-dev - apache2-utils - libapache-mod-ssl - libapache-mod-ssl-doc - libapr0 - libapr0-dev Description : Apache did not honour the "SSLVerifyClient require" directive within a directive "SSLVerifyClient optional". This permited clients to bypass client certificate validation on servers with the above configuration. (CVE-2005-2700) Filip Sneppe discovered a Denial of Service vulnerability in the byte range filter handler. By requesting certain large byte ranges, a remote attacker could cause memory exhaustion in the server. (CVE-2005-2728) The updated libapache-mod-ssl also fixes two older Denial of Service vulnerabilities: A format string error in the ssl_log() function which could be exploited to crash the server (CVE-2004-0700), and a flaw in the SSL cipher negotiation which could be exploited to terminate a session (CVE-2004-0885). Please note that Apache 1.3 and libapache-mod-ssl are not officially supported (they are in the "universe" component of the Ubuntu archive). Solution : Upgrade to : - apache2-2.0.53-5ubuntu5.3 (Ubuntu 5.04) - apache2-common-2.0.53-5ubuntu5.3 (Ubuntu 5.04) - apache2-doc-2.0.53-5ubuntu5.3 (Ubuntu 5.04) - apache2-mpm-perchild-2.0.53-5ubuntu5.3 (Ubuntu 5.04) - apache2-mpm-prefork-2.0.53-5ubuntu5.3 (Ubuntu 5.04) - apache2-mpm-threadpool-2.0.53-5ubuntu5.3 (Ubuntu 5.04) - apache2-mpm-worker-2.0.53-5ubuntu5.3 (Ubuntu 5.04) - apache2-prefork-dev-2.0.53-5ubuntu5.3 (Ubuntu 5.04) - apache2-threaded-dev-2.0.53-5ubuntu5.3 (Ubuntu 5.04) - apache2-utils-2.0.53-5ubuntu5. [...] Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi |
||
Cables, Connectors |
Cisco WS-C3560-48PS-S 48-Port Managed Gigabit PoE Switch
$56.00
Cisco WS-C3650-48FD-S 48-Port Gigabit Managed Switch
$49.99
Cisco Nexus 48-Port 10G SFP+ Switch N9K-9396PX w/ 9K-M12PQ 12-Port 40G QSFP
$249.99
EtherWAN EX17242 Web-Smart 24-Port PoE Gigabit Ethernet Switch
$29.99
HP 2530-48G 48 Port Gigabit Ethernet Network Switch J9775A
$30.95
New Linksys SE3005 5-port Gigabit Ethernet Switch
$18.99
Linksys SE3008 8 Ports Rack Mountable Gigabit Ethernet Switch
$21.99
HP ProCurve 2530-24G J9776A 24 Port Gigabit Ethernet Managed Network Switch
$34.99
Juniper Networks EX3300-48P 48-Port PoE+ 4x SFP+ Network Switch w/ Power Cord
$43.95
Netgear Prosafe Plus JGS524PE 24 Port Gigabit Switch 12 Port PoE JGS524PE-100NAS
$129.98
|
||
No Discussions have been posted on this vulnerability. |