| VID |
22020 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Apache web server uses a vulnerable version of Mod_SSL or Apache-SSL. Mod_SSL and Apache-SSL are implementations of SSL (Secure Socket Layer) using the OpenSSL toolkit for the Apache webserver. A buffer overflow vulnerability exists in modssl versions prior to 2.8.7-1.3.23 and Apache-SSL versions prior to 1.47-1.3.22 that may allow for attackers to execute arbitrary code. The overflow exists when the modules attempt to cache SSL sessions. Vulnerable versions of mod_ssl and Apache-SSL are incapable of handling large session representations. To exploit this vulnerability, the attacker must somehow increase the size of the data representing the session. This may be accomplished through the use of an extremely large client certificate. This is only possible if verification of client certificates is enabled, and if the certificate is verified by a CA trusted by the webserver. Though these requirements make this vulnerability theoretical, administrators are still urged to upgrade.
* Note that this scanner solely relied on the banner of the remote Apache web server to assess this vulnerability. |
| Recommendation |
Upgrade to the latest version of Apache-SSL (1.47 or later) or Mod_ssl (2.8.7 or later), available from:
For Apache-SSL, http://www.apache-ssl.org/ For Mod_ssl, http://www.modssl.org/source/ |
| Related URL |
CVE-2002-0082 (CVE) |
| Related URL |
4189 (SecurityFocus) |
| Related URL |
8308 (ISS) |
|