Executive Summary
Summary | |
---|---|
Title | Apache 2 vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-177-1 | First vendor Publication | 2005-09-07 |
Vendor | Ubuntu | Last vendor Modification | 2005-09-07 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) The following packages are affected: apache2-mpm-perchild apache2-mpm-prefork apache2-mpm-threadpool apache2-mpm-worker libapache-mod-ssl The problem can be corrected by upgrading the affected package to version 2.0.50-12ubuntu4.8 (for Ubuntu 4.10), or 2.0.53-5ubuntu5.3 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Apache did not honour the "SSLVerifyClient require" directive within a Filip Sneppe discovered a Denial of Service vulnerability in the byte range filter handler. By requesting certain large byte ranges, a remote attacker could cause memory exhaustion in the server. (CAN-2005-2728) The updated libapache-mod-ssl also fixes two older Denial of Service vulnerabilities: A format string error in the ssl_log() function which could be exploited to crash the server (CAN-2004-0700), and a flaw in the SSL cipher negotiation which could be exploited to terminate a session (CAN-2004-0885). Please note that Apache 1.3 and libapache-mod-ssl are not officially supported (they are in the "universe" component of the Ubuntu archive). |
Original Source
Url : http://www.ubuntu.com/usn/USN-177-1 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10017 | |||
Oval ID: | oval:org.mitre.oval:def:10017 | ||
Title: | The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field. | ||
Description: | The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-2728 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10384 | |||
Oval ID: | oval:org.mitre.oval:def:10384 | ||
Title: | The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration. | ||
Description: | The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0885 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:10416 | |||
Oval ID: | oval:org.mitre.oval:def:10416 | ||
Title: | ssl_engine_kernel.c in mod_ssl before 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions. | ||
Description: | ssl_engine_kernel.c in mod_ssl before 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-2700 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1246 | |||
Oval ID: | oval:org.mitre.oval:def:1246 | ||
Title: | VirusVault CGI Byterange Request DoS | ||
Description: | The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-2728 | Version: | 2 |
Platform(s): | HP-UX 11 | Product(s): | Apache |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1727 | |||
Oval ID: | oval:org.mitre.oval:def:1727 | ||
Title: | Webproxy CGI Byterange Request DoS | ||
Description: | The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-2728 | Version: | 2 |
Platform(s): | HP-UX 11 | Product(s): | Apache |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:760 | |||
Oval ID: | oval:org.mitre.oval:def:760 | ||
Title: | Apache HTTP Byte-range DoS Vulnerability | ||
Description: | The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-2728 | Version: | 1 |
Platform(s): | HP-UX 11 | Product(s): | Apache |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2010-02-03 | Name : Solaris Update for Apache 1.3 122912-19 File : nvt/gb_solaris_122912_19.nasl |
2010-02-03 | Name : Solaris Update for Apache 1.3 122911-19 File : nvt/gb_solaris_122911_19.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-13 | Name : Solaris Update for Apache 1.3 122912-17 File : nvt/gb_solaris_122912_17.nasl |
2009-10-13 | Name : Solaris Update for Apache 1.3 122911-17 File : nvt/gb_solaris_122911_17.nasl |
2009-10-10 | Name : SLES9: Security update for Apache2 File : nvt/sles9p5021652.nasl |
2009-10-10 | Name : SLES9: Security update for apache File : nvt/sles9p5014050.nasl |
2009-10-10 | Name : SLES9: Security update for apache2,apache2-prefork,apache2-worker File : nvt/sles9p5013454.nasl |
2009-10-10 | Name : SLES9: Security update for apache2 File : nvt/sles9p5009713.nasl |
2009-09-23 | Name : Solaris Update for Apache 1.3 122911-16 File : nvt/gb_solaris_122911_16.nasl |
2009-09-23 | Name : Solaris Update for Apache 1.3 122912-16 File : nvt/gb_solaris_122912_16.nasl |
2009-06-03 | Name : Solaris Update for Apache 1.3 122911-15 File : nvt/gb_solaris_122911_15.nasl |
2009-06-03 | Name : Solaris Update for Apache 1.3 122912-15 File : nvt/gb_solaris_122912_15.nasl |
2009-05-05 | Name : HP-UX Update for HP-UX Pkg HPSBUX01123 File : nvt/gb_hp_ux_HPSBUX01123.nasl |
2009-05-05 | Name : HP-UX Update for Apache HPSBUX01232 File : nvt/gb_hp_ux_HPSBUX01232.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200410-21 (apache) File : nvt/glsa_200410_21.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200509-12 (Apache) File : nvt/glsa_200509_12.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200508-15 (apache) File : nvt/glsa_200508_15.nasl |
2008-09-04 | Name : FreeBSD Ports: apache+mod_ssl File : nvt/freebsd_apache+mod_ssl.nasl |
2008-09-04 | Name : FreeBSD Ports: ru-apache+mod_ssl File : nvt/freebsd_ru-apache+mod_ssl.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 807-1 (libapache-mod-ssl) File : nvt/deb_807_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 805-1 (apache2) File : nvt/deb_805_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 532-2 (libapache-mod-ssl) File : nvt/deb_532_2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 532-1 (libapache-mod-ssl) File : nvt/deb_532_1.nasl |
2005-11-03 | Name : mod_ssl hook functions format string vulnerability File : nvt/mod_ssl_hook_functions_format_string_vuln.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2005-251-02 mod_ssl File : nvt/esoft_slk_ssa_2005_251_02.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2004-299-01 apache, mod_ssl, php File : nvt/esoft_slk_ssa_2004_299_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
19188 | Apache HTTP Server mod_ssl SSLVerifyClient Per-location Context Restriction B... mod_ssl contains a flaw that may allow a malicious user to bypass certain security restrictions. The issue is due to an error in enforcing client-based certificate authentication ("SSLVerifyClient require") in per-location context, if "SSLVerifyClient optional" was configured in the global virtual host configuration. It is possible that the flaw may allow an attacker to bypass client-based certificate authentication, resulting in a loss of confidentiality or integrity. |
18977 | Apache HTTP Server Crafted HTTP Range Header DoS |
10637 | Apache HTTP Server mod_ssl SSLCipherSuite Access Restriction Bypass Apache mod_ssl SSL CipherSuite contains a flaw that may allow a malicious user to bypass SSL CipherSuite access restrictions. The issue is triggered when the SSL CipherSuite directive is used with a directory context to require a restricted set of cipher suites. An attacker can use an alternate ciphersuite possibly allowing them to bypass access restrictions resulting in a loss of confidentiality and/or integrity. |
7929 | Apache HTTP Server mod_ssl ssl_engine_log.c mod_proxy Hook Function Remote Fo... The mod_ssl ssl_log function in Apache contains a flaw that may allow an attacker to execute arbitrary messages. The issue is triggered due to a ssl_log() format string error within the 'mod_proxy' hook functions. It is possible that the flaw may allow an attacker to execute arbitrary messages via format string specifiers in certain log messages for HTTPS resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Apache Byte-Range Filter denial of service attempt RuleID : 21260 - Revision : 8 - Type : SERVER-APACHE |
2014-01-10 | Apache Byte-Range Filter denial of service attempt RuleID : 17354 - Revision : 8 - Type : SERVER-APACHE |
2014-01-10 | Apache mod_ssl hook functions format string attempt RuleID : 15980 - Revision : 7 - Type : SERVER-APACHE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0523.nasl - Type : ACT_GATHER_INFO |
2010-01-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0524.nasl - Type : ACT_GATHER_INFO |
2010-01-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0261.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_18974c8a1fbd11d9814e0001020eed82.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_4238151d207a11d9bfe20090962cff2a.nasl - Type : ACT_GATHER_INFO |
2008-03-26 | Name : The remote version of Apache is affected by multiple vulnerabilities. File : apache_2_0_55.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2006_051.nasl - Type : ACT_GATHER_INFO |
2006-07-03 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2005-608.nasl - Type : ACT_GATHER_INFO |
2006-03-21 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_34163.nasl - Type : ACT_GATHER_INFO |
2006-03-21 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_34123.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-177-1.nasl - Type : ACT_GATHER_INFO |
2005-11-30 | Name : The remote operating system is missing a vendor-supplied patch. File : macosx_SecUpd2005-009.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2005-251-02.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2005-161.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200509-12.nasl - Type : ACT_GATHER_INFO |
2005-09-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-849.nasl - Type : ACT_GATHER_INFO |
2005-09-17 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-773.nasl - Type : ACT_GATHER_INFO |
2005-09-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-848.nasl - Type : ACT_GATHER_INFO |
2005-09-13 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-807.nasl - Type : ACT_GATHER_INFO |
2005-09-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-805.nasl - Type : ACT_GATHER_INFO |
2005-09-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-608.nasl - Type : ACT_GATHER_INFO |
2005-08-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200508-15.nasl - Type : ACT_GATHER_INFO |
2005-08-18 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2005-007.nasl - Type : ACT_GATHER_INFO |
2005-08-08 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_33075.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2004-299-01.nasl - Type : ACT_GATHER_INFO |
2004-12-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-600.nasl - Type : ACT_GATHER_INFO |
2004-12-02 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd20041202.nasl - Type : ACT_GATHER_INFO |
2004-11-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2004-420.nasl - Type : ACT_GATHER_INFO |
2004-11-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-562.nasl - Type : ACT_GATHER_INFO |
2004-11-02 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2004-122.nasl - Type : ACT_GATHER_INFO |
2004-10-22 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200410-21.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-532.nasl - Type : ACT_GATHER_INFO |
2004-09-09 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2004-408.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2004-075.nasl - Type : ACT_GATHER_INFO |
2004-07-16 | Name : The remote web server is using a module that is affected by a remote code exe... File : mod_ssl_hook_functions_format_string_vuln.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote host is using an unsupported version of Mac OS X. File : macosx_version.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:01:43 |
|