Debian DSA-803-1 : apache - programming error

medium Nessus Plugin ID 19610

Synopsis

The remote Debian host is missing a security-related update.

Description

A vulnerability has been discovered in the Apache web server. When it is acting as an HTTP proxy, it allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct cross-site scripting attacks, which causes Apache to incorrectly handle and forward the body of the request.

The fix for this bug is contained in the apache-common package which means that there isn't any need for a separate update of the apache-perl and apache-ssl package.

Solution

Upgrade the Apache package.

For the old stable distribution (woody) this problem has been fixed in version 1.3.26-0woody7.

For the stable distribution (sarge) this problem has been fixed in version 1.3.33-6sarge1.

See Also

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322607

http://www.debian.org/security/2005/dsa-803

Plugin Details

Severity: Medium

ID: 19610

File Name: debian_DSA-803.nasl

Version: 1.19

Type: local

Agent: unix

Published: 9/12/2005

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.5

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:3.0, p-cpe:/a:debian:debian_linux:apache, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 9/8/2005

Vulnerability Publication Date: 6/6/2005

Reference Information

CVE: CVE-2005-2088

DSA: 803