VID |
22594 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the version of Apache 2.0 installed on the remote host is older than 2.0.65. Such versions may be affected by several vulnerabilities :
- A flaw exists in the byte-range filter, making it vulnerable to denial of service. (CVE-2011-3192)
- A flaw exists in 'mod_proxy' where it doesn't properly interact with 'RewriteRule' and 'ProxyPassMatch' in reverse proxy configurations. (CVE-2011-3368)
- A privilege escalation vulnerability exists relating to a heap-based buffer overflow in 'ap_pregsub' function in 'mod_setenvif' module via .htaccess file. (CVE-2011-3607)
- A local security bypass vulnerability exists within scoreboard shared memory that may allow the child process to cause the parent process to crash. (CVE-2012-0031)
- A flaw exists within the status 400 code when no custom ErrorDocument is specified that could disclose 'httpOnly' cookies. (CVE-2012-0053)
- A flaw exists in the 'RewriteLog' function where it fails to sanitize escape sequences written to log files, which could result in arbitrary command execution. (CVE-2013-1862)
* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.apache.org/dist/httpd/CHANGES_2.0.65 http://httpd.apache.org/security/vulnerabilities_20.html http://mail-archives.apache.org/mod_mbox/httpd-announce/201307.mbox/%3C20130710124920.2b8793ed.wrowe@rowe-clan.net%3E
* Platforms Affected: Apache HTTP versions 2.0.x prior to 2.0.65 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache HTTP Server (2.0.65 or later), available from the Apache Software Foundation download site, http://httpd.apache.org/download.cgi |
Related URL |
CVE-2011-3192,CVE-2011-3368,CVE-2011-3607,CVE-2012-0031,CVE-2012-0053,CVE-2013-1862 (CVE) |
Related URL |
49303,49957,50494,51407,51706,59826 (SecurityFocus) |
Related URL |
(ISS) |
|