RHEL 3 : httpd (RHSA-2004:342)

high Nessus Plugin ID 12636

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated httpd packages that fix a buffer overflow in mod_ssl and a remotely triggerable memory leak are now available.

The Apache HTTP server is a powerful, full-featured, efficient, and freely-available Web server.

A stack-based buffer overflow was discovered in mod_ssl that could be triggered if using the FakeBasicAuth option. If mod_ssl was sent a client certificate with a subject DN field longer than 6000 characters, a stack overflow occured if FakeBasicAuth had been enabled. In order to exploit this issue the carefully crafted malicious certificate would have had to be signed by a Certificate Authority which mod_ssl is configured to trust. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0488 to this issue.

A remotely triggered memory leak in the Apache HTTP Server earlier than version 2.0.50 was also discovered. This allowed a remote attacker to perform a denial of service attack against the server by forcing it to consume large amounts of memory. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0493 to this issue.

Users of the Apache HTTP server should upgrade to these updated packages, which contain backported patches that address these issues.

Solution

Update the affected httpd, httpd-devel and / or mod_ssl packages.

See Also

https://access.redhat.com/security/cve/cve-2004-0488

https://access.redhat.com/security/cve/cve-2004-0493

http://www.apacheweek.com/features/security-20

https://access.redhat.com/errata/RHSA-2004:342

Plugin Details

Severity: High

ID: 12636

File Name: redhat-RHSA-2004-342.nasl

Version: 1.31

Type: local

Agent: unix

Published: 7/6/2004

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:mod_ssl, cpe:/o:redhat:enterprise_linux:3, p-cpe:/a:redhat:enterprise_linux:httpd-devel, p-cpe:/a:redhat:enterprise_linux:httpd

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 7/6/2004

Vulnerability Publication Date: 7/7/2004

Reference Information

CVE: CVE-2004-0488, CVE-2004-0493

RHSA: 2004:342