Slackware 10.0 / 10.1 / 10.2 / 8.1 / 9.0 / 9.1 / current : apache (SSA:2005-310-04)

medium Nessus Plugin ID 20151

Synopsis

The remote Slackware host is missing a security update.

Description

New apache packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix potential security issues: * If a request contains both Transfer-Encoding and Content-Length headers, remove the Content-Length, mitigating some HTTP Request Splitting/Spoofing attacks. * Added TraceEnable [on|off|extended] per-server directive to alter the behavior of the TRACE method. It's hard to say how much real-world impact these have, as there's no more information about that in the announcement. The original Apache announement can be read here:
http://www.apache.org/dist/httpd/Announcement1.3.html Note that if you use mod_ssl, you will also need a new mod_ssl package. These have been provided for the same releases of Slackware.

Solution

Update the affected apache and / or mod_ssl packages.

See Also

http://www.nessus.org/u?a26cbb9f

http://www.nessus.org/u?4875d9dd

Plugin Details

Severity: Medium

ID: 20151

File Name: Slackware_SSA_2005-310-04.nasl

Version: 1.16

Type: local

Published: 11/7/2005

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.5

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:mod_ssl, cpe:/o:slackware:slackware_linux:10.1, cpe:/o:slackware:slackware_linux:8.1, cpe:/o:slackware:slackware_linux:9.0, cpe:/o:slackware:slackware_linux:9.1, p-cpe:/a:slackware:slackware_linux:apache, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:10.2, cpe:/o:slackware:slackware_linux:10.0

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Patch Publication Date: 11/6/2005

Vulnerability Publication Date: 5/26/2005

Reference Information

CVE: CVE-2005-2088

SSA: 2005-310-04