Fedora 7 httpd-2.2.8-1.fc7 (2008-1711) includes fixes for cross-site scripting and denial of service vulnerabilities in various Apache modules
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Fedora | [SECURITY] Fedora 8 Update: httpd-2.2.8-1.fc8 | 16 Feb 200802:11 | – | fedora |
Fedora | [SECURITY] Fedora 7 Update: httpd-2.2.8-1.fc7 | 16 Feb 200802:08 | – | fedora |
RedHat Linux | (RHSA-2008:0009) Moderate: httpd security update | 21 Jan 200800:00 | – | redhat |
RedHat Linux | (RHSA-2008:0008) Moderate: httpd security update | 15 Jan 200800:00 | – | redhat |
RedHat Linux | (RHSA-2008:0007) Moderate: httpd security update | 15 Jan 200800:00 | – | redhat |
RedHat Linux | (RHSA-2008:0004) Moderate: apache security update | 15 Jan 200800:00 | – | redhat |
RedHat Linux | (RHSA-2008:0006) Moderate: httpd security update | 15 Jan 200800:00 | – | redhat |
RedHat Linux | (RHSA-2008:0005) Moderate: httpd security update | 15 Jan 200800:00 | – | redhat |
ALT Linux | Security fix for the ALT Linux 9 package apache2 version 2.2.8-alt1 | 29 Feb 200800:00 | – | altlinux |
ALT Linux | Security fix for the ALT Linux 10 package apache2 version 2.2.8-alt1 | 29 Feb 200800:00 | – | altlinux |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2008-1711.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(31105);
script_version("1.21");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2007-5000", "CVE-2007-6388", "CVE-2007-6421", "CVE-2007-6422", "CVE-2008-0005");
script_bugtraq_id(26838, 27234, 27236, 27237);
script_xref(name:"FEDORA", value:"2008-1711");
script_name(english:"Fedora 7 : httpd-2.2.8-1.fc7 (2008-1711)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Notes: This update includes the latest release of httpd 2.2, which
fixes a number of minor security issues and other bugs. A flaw was
found in the mod_imagemap module. On sites where mod_imagemap was
enabled and an imagemap file was publicly available, a cross-site
scripting attack was possible. (CVE-2007-5000) A flaw was found in the
mod_status module. On sites where mod_status was enabled and the
status pages were publicly accessible, a cross- site scripting attack
was possible. (CVE-2007-6388) A flaw was found in the
mod_proxy_balancer module. On sites where mod_proxy_balancer was
enabled, a cross-site scripting attack against an authorized user was
possible. (CVE-2007-6421) A flaw was found in the mod_proxy_balancer
module. On sites where mod_proxy_balancer was enabled, an authorized
user could send a carefully crafted request that would cause the
Apache child process handling that request to crash. This could lead
to a denial of service if using a threaded Multi- Processing Module.
(CVE-2007-6422) A flaw was found in the mod_proxy_ftp module. On sites
where mod_proxy_ftp was enabled and a forward proxy was configured, a
cross-site scripting attack was possible against browsers which do not
correctly derive the response character set following the rules in RFC
2616. (CVE-2008-0005)
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=419931"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=427228"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=427229"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=427230"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=427739"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2008-February/007922.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?d025651e"
);
script_set_attribute(attribute:"solution", value:"Update the affected httpd package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(79, 399);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:httpd");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:7");
script_set_attribute(attribute:"patch_publication_date", value:"2008/02/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2008/02/18");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 7.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC7", reference:"httpd-2.2.8-1.fc7")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "httpd");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo