According to its banner, the version of Apache 2.4.x running on the remote host is prior to 2.4.2. It is, therefore, potentially affected by an insecure library loading issue.
The utility ‘apachectl’ can receive a zero-length directory name in the LD_LIBRARY_PATH via the ‘envvars’ file. A local attacker with access to that utility could exploit this to load a malicious Dynamic Shared Object (DSO), leading to arbitrary code execution.
Note that Nessus did not actually test for this flaw, but instead has relied on the version in the server’s banner.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(58795);
script_version("1.12");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");
script_cve_id("CVE-2012-0883");
script_bugtraq_id(53046);
script_name(english:"Apache 2.4.x < 2.4.2 'LD_LIBRARY_PATH' Insecure Library Loading");
script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by an insecure library loading
issue.");
script_set_attribute(attribute:"description", value:
"According to its banner, the version of Apache 2.4.x running on the
remote host is prior to 2.4.2. It is, therefore, potentially affected
by an insecure library loading issue.
The utility 'apachectl' can receive a zero-length directory name in
the LD_LIBRARY_PATH via the 'envvars' file. A local attacker with
access to that utility could exploit this to load a malicious Dynamic
Shared Object (DSO), leading to arbitrary code execution.
Note that Nessus did not actually test for this flaw, but instead
has relied on the version in the server's banner.");
script_set_attribute(attribute:"see_also", value:"https://archive.apache.org/dist/httpd/CHANGES_2.4.2");
script_set_attribute(attribute:"see_also", value:"http://httpd.apache.org/security/vulnerabilities_24.html");
script_set_attribute(attribute:"see_also", value:"http://svn.apache.org/viewvc?view=revision&revision=1296428");
script_set_attribute(attribute:"solution", value:
"Upgrade to Apache version 2.4.2 or later.");
script_set_attribute(attribute:"agent", value:"all");
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-0883");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2012/03/02");
script_set_attribute(attribute:"patch_publication_date", value:"2012/04/17");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/04/19");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:http_server");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Web Servers");
script_copyright(english:"This script is Copyright (C) 2012-2022 Tenable Network Security, Inc.");
script_dependencies("apache_http_version.nasl", "apache_http_server_nix_installed.nbin", "apache_httpd_win_installed.nbin");
script_require_keys("installed_sw/Apache");
exit(0);
}
include('vcf.inc');
include('vcf_extras.inc');
app_info = vcf::apache_http_server::combined_get_app_info(app:'Apache');
constraints = [
{ 'min_version' : '2.3.0', 'fixed_version' : '2.4.2' }
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
Vendor | Product | Version | CPE |
---|---|---|---|
apache | http_server | cpe:/a:apache:http_server |