VID |
22544 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the version of Apache 2.2 installed on the remote host is earlier than 2.2.22. It is, therefore, potentially affected by the following vulnerabilities:
- When configured as a reverse proxy, improper use of the RewriteRule and ProxyPassMatch directives could cause the web server to proxy requests to arbitrary hosts. This could allow a remote attacker to indirectly send requests to intranet servers. (CVE-2011-3368, CVE-2011-4317)
- A heap-based buffer overflow exists when mod_setenvif module is enabled and both a maliciously crafted 'SetEnvIf' directive and a maliciously crafted HTTP request header are used. (CVE-2011-3607)
- A format string handling error can allow the server to be crashed via maliciously crafted cookies. (CVE-2012-0021)
- An error exists in 'scoreboard.c' that can allow local attackers to crash the server during shutdown. (CVE-2012-0031)
- An error exists in 'protocol.c' that can allow 'HTTPOnly' cookies to be exposed to attackers through the malicious use of either long or malformed HTTP headers. (CVE-2012-0053)
* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.apache.org/dist/httpd/CHANGES_2.2.22 http://httpd.apache.org/security/vulnerabilities_22.html
* Platforms Affected: Apache HTTP versions 2.2 prior to 2.2.22 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache HTTP Server (2.2.22 or later), available from the Apache Software Foundation download site, http://httpd.apache.org/download.cgi -- OR -- As a workaround, ensure that the affected modules are not in use. |
Related URL |
CVE-2011-3368,CVE-2011-3607,CVE-2011-4317,CVE-2012-0021,CVE-2012-0031,CVE-2012-0053 (CVE) |
Related URL |
49957,50494,50802,51407,51705,51706 (SecurityFocus) |
Related URL |
(ISS) |
|