Korean
<< Back
VID 22272
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The remote Web server is using a version of Apache mod_ssl module which is older than 2.8.19.
The mod_ssl module for Apache HTTP Server is vulnerable to a format string vulnerability, caused by a flaw in way the ssl_log() function of the mod_ssl module handles hostnames. By supplying a specially crafted hostname value in an HTTPS request such as 'https://foo%s.example.com/' and a hostname 'foo%s' exists in the 'example.com' zone, a unauthenticated attacker could remotely exploit this vulnerability. To successfully exploit this vulnerability could cause arbitrary code to be executed on the affected system.

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability. Several Linux distributions patched the old version of mod_ssl module, so this might be a false positive. Please contact your vendor to determine if your Web server really is vulnerable to this flaw. If the server already has been patched or reported by vendor that is not vulnerable, then ignore this alert.

* References:
http://www.kb.cert.org/vuls/id/303448
http://www.securitytracker.com/alerts/2004/Jul/1010717.html

* Platforms Affected:
The versions prior to Mod_SSL 2.8.19 - Apache 1.3.31
Apache HTTP Server Any version
Mandrake Linux Any version
Debian Linux Any version
Gentoo Linux Any version
Apple Mac OS X Any version
Conectiva Linux Any version
Trustix Secure Linux Any version
HP Secure OS software for Linux
Caldera OpenLinux Workstation, Server Any version
Compaq Compaq Secure Web Server for OpenVMS and Tru64
Recommendation Upgrade to the latest version (mod_ssl 2.8.19 for Apache 1.3.31 or later) of Apache and mod_ssl, available from Web site for Apache mod_ssl at http://www.modssl.org/
Related URL CVE-2004-0700 (CVE)
Related URL 10736 (SecurityFocus)
Related URL (ISS)