FreeBSD : apache2 -- SSL remote DoS (7b81fc47-239f-11d9-814e-0001020eed82)

medium Nessus Plugin ID 37076

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The Apache HTTP Server 2.0.51 release notes report that the following issues have been fixed :

A segfault in mod_ssl which can be triggered by a malicious remote server, if proxying to SSL servers has been configured.
[CAN-2004-0751]

A potential infinite loop in mod_ssl which could be triggered given particular timing of a connection abort. [CAN-2004-0748]

Solution

Update the affected package.

See Also

https://marc.info/?l=apache-httpd-announce&m=109527608022322

http://www.nessus.org/u?0896b138

Plugin Details

Severity: Medium

ID: 37076

File Name: freebsd_pkg_7b81fc47239f11d9814e0001020eed82.nasl

Version: 1.19

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apache, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 10/21/2004

Vulnerability Publication Date: 7/7/2004

Reference Information

CVE: CVE-2004-0748, CVE-2004-0751

BID: 11094, 11154