| VID |
22273 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Apache web server, according to its banner, is vulnerable to an Access Rule Bypass Vulnerability. The Apache web server, maintained by the Apache Software Foundation, is an extremely popular open-source Web server. Apache HTTP Server versions 1.3.29 and earlier for big-endian 64-bit platforms could allow a remote attacker to bypass intended access restrictions, caused by a flaw in the mod_access module, a fail to match the proper rule when IP addresses are specified without a netmask in an Allow or Deny rule. A remote attacker could gain unauthorized access to files and directories, while other users could be denied access when these rules fail.
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://securitytracker.com/alerts/2004/Mar/1009338.html
* Platforms Affected: Apache HTTP Server 1.3.29 and earlier Gentoo Linux Any version Mandrake Linux 10.0, 9.2 Mandrake Linux Corporate Server 1.0.1, 2.1 Mandrake Multi Network Firewall 8.2 OpenBSD 3.3, OpenBSD 3.4 Slackware Linux 8.1, 9.0, 9.1, current Trustix Secure Linux 1.5 Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of Apache HTTP Server (1.3.30-dev or later), available from Apache Software Foundation download site at http://httpd.apache.org
For other distributions: Contact your vendor for upgrade or patch information. |
| Related URL |
CVE-2003-0993 (CVE) |
| Related URL |
9829 (SecurityFocus) |
| Related URL |
15422 (ISS) |
|