ID SECURITYVULNS:DOC:21917 Type securityvulns Reporter Securityvulns Modified 2009-06-01T00:00:00
Description
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2009:124
http://www.mandriva.com/security/
Package : apache
Date : May 31, 2009
Affected: 2008.1, 2009.0, 2009.1, Corporate 4.0
Problem Description:
Multiple vulnerabilities has been found and corrected in apache:
Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c
in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to
cause a denial of service (memory consumption) via multiple calls, as
demonstrated by initial SSL client handshakes to the Apache HTTP Server
mod_ssl that specify a compression algorithm (CVE-2008-1678). Note
that this security issue does not really apply as zlib compression
is not enabled in the openssl build provided by Mandriva, but apache
is patched to address this issue anyway (conserns 2008.1 only).
Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the
mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c
in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,
allows remote attackers to inject arbitrary web script or HTML via
wildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this
security issue was initially addressed with MDVSA-2008:195 but the
patch fixing the issue was added but not applied in 2009.0.
The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not
properly handle Options=IncludesNOEXEC in the AllowOverride directive,
which allows local users to gain privileges by configuring (1) Options
Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a
.htaccess file, and then inserting an exec element in a .shtml file
(CVE-2009-1195).
This update provides fixes for these vulnerabilities.
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
{"id": "SECURITYVULNS:DOC:21917", "bulletinFamily": "software", "title": "[ MDVSA-2009:124 ] apache", "description": "\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2009:124\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : apache\r\n Date : May 31, 2009\r\n Affected: 2008.1, 2009.0, 2009.1, Corporate 4.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Multiple vulnerabilities has been found and corrected in apache:\r\n \r\n Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c\r\n in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to\r\n cause a denial of service (memory consumption) via multiple calls, as\r\n demonstrated by initial SSL client handshakes to the Apache HTTP Server\r\n mod_ssl that specify a compression algorithm (CVE-2008-1678). Note\r\n that this security issue does not really apply as zlib compression\r\n is not enabled in the openssl build provided by Mandriva, but apache\r\n is patched to address this issue anyway (conserns 2008.1 only).\r\n \r\n Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the\r\n mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\r\n in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\r\n allows remote attackers to inject arbitrary web script or HTML via\r\n wildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this\r\n security issue was initially addressed with MDVSA-2008:195 but the\r\n patch fixing the issue was added but not applied in 2009.0.\r\n \r\n The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not\r\n properly handle Options=IncludesNOEXEC in the AllowOverride directive,\r\n which allows local users to gain privileges by configuring (1) Options\r\n Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a\r\n .htaccess file, and then inserting an exec element in a .shtml file\r\n (CVE-2009-1195).\r\n \r\n This update provides fixes for these vulnerabilities.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2008.1:\r\n 7ec559d730fe009bdf1e4a78acd0d826 2008.1/i586/apache-base-2.2.8-6.2mdv2008.1.i586.rpm\r\n 52e9047dd9922fb706e1ae661ffec647 2008.1/i586/apache-devel-2.2.8-6.2mdv2008.1.i586.rpm\r\n 057298a3f2fd895fc341925ef1f68851 2008.1/i586/apache-htcacheclean-2.2.8-6.2mdv2008.1.i586.rpm\r\n 171068e2dfc51397c07a9d3fd548f1b6 2008.1/i586/apache-mod_authn_dbd-2.2.8-6.2mdv2008.1.i586.rpm\r\n 822918ddb258642c9213d338b98c14fb 2008.1/i586/apache-mod_cache-2.2.8-6.2mdv2008.1.i586.rpm\r\n 8a2b046526ebe44fd849a9e9858e0494 2008.1/i586/apache-mod_dav-2.2.8-6.2mdv2008.1.i586.rpm\r\n 23bbfb62795eff6c23ef689a2193fb8f 2008.1/i586/apache-mod_dbd-2.2.8-6.2mdv2008.1.i586.rpm\r\n 2189ba0bfee1364eb4416418db4258e1 2008.1/i586/apache-mod_deflate-2.2.8-6.2mdv2008.1.i586.rpm\r\n 2c5506127b9b3caa25910bcf6d5953cc \r\n2008.1/i586/apache-mod_disk_cache-2.2.8-6.2mdv2008.1.i586.rpm\r\n 63492ccf2e9a89ff791f491f99bfc23c \r\n2008.1/i586/apache-mod_file_cache-2.2.8-6.2mdv2008.1.i586.rpm\r\n 38e9f510daf9bf904f1f9b8471030650 2008.1/i586/apache-mod_ldap-2.2.8-6.2mdv2008.1.i586.rpm\r\n 37ed8ed4614e45e2188b6d714c8530ed 2008.1/i586/apache-mod_mem_cache-2.2.8-6.2mdv2008.1.i586.rpm\r\n f083445d93d7e8f0035b10777234ef38 2008.1/i586/apache-mod_proxy-2.2.8-6.2mdv2008.1.i586.rpm\r\n 7ecc1ff5e58835c0323626116c93725d 2008.1/i586/apache-mod_proxy_ajp-2.2.8-6.2mdv2008.1.i586.rpm\r\n 9cf62f5b52508dedb470f9b980d6d4d5 2008.1/i586/apache-mod_ssl-2.2.8-6.2mdv2008.1.i586.rpm\r\n b378b2b4103f5876ce746233173278e5 2008.1/i586/apache-modules-2.2.8-6.2mdv2008.1.i586.rpm\r\n c78663fdace7ec31eeae3e9a0c01619a 2008.1/i586/apache-mod_userdir-2.2.8-6.2mdv2008.1.i586.rpm\r\n cc2281cf44d7271cf507071c65d46309 2008.1/i586/apache-mpm-event-2.2.8-6.2mdv2008.1.i586.rpm\r\n 8161574d6883d29318276b974a3bd95d 2008.1/i586/apache-mpm-itk-2.2.8-6.2mdv2008.1.i586.rpm\r\n 59a4bfb20f243d274f6d3267dd8621cb 2008.1/i586/apache-mpm-prefork-2.2.8-6.2mdv2008.1.i586.rpm\r\n cc2f58f832848ace53b18fbfb272fb83 2008.1/i586/apache-mpm-worker-2.2.8-6.2mdv2008.1.i586.rpm\r\n 86b2fe589d35fd6821d5994b0efa0aa2 2008.1/i586/apache-source-2.2.8-6.2mdv2008.1.i586.rpm \r\n 390895e36f7c0863501a429d6583ee02 2008.1/SRPMS/apache-2.2.8-6.2mdv2008.1.src.rpm\r\n\r\n Mandriva Linux 2008.1/X86_64:\r\n 520bd0c278ebae63de0f4479da178124 2008.1/x86_64/apache-base-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n e254c98a6796b826f09eea2fab69170f 2008.1/x86_64/apache-devel-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 26d424de3c58a585a266533ee9fe3718 \r\n2008.1/x86_64/apache-htcacheclean-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n d95d814fc660560124428cd0c8093611 \r\n2008.1/x86_64/apache-mod_authn_dbd-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n d73f35d2faa2ad4d3236f990f52f510b 2008.1/x86_64/apache-mod_cache-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 95990c1b5cc780a4ad7b497c49ee708e 2008.1/x86_64/apache-mod_dav-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 7624f412618c4692531b67ea2bd97345 2008.1/x86_64/apache-mod_dbd-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 01a71299acaba43d0d7dd22e8d2196f6 \r\n2008.1/x86_64/apache-mod_deflate-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n dfdb0b4c04bf1a766b3f5129ed1a4613 \r\n2008.1/x86_64/apache-mod_disk_cache-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 842d0d8fa91f73b27ea5663e7e5e1831 \r\n2008.1/x86_64/apache-mod_file_cache-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 8b7181d1f0050c8d2f5b4c54c5418de1 2008.1/x86_64/apache-mod_ldap-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 6046a28897a88793d25706eb67d12bf0 \r\n2008.1/x86_64/apache-mod_mem_cache-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 4b86aa1c01d88018e38d0ab10bcf5e45 2008.1/x86_64/apache-mod_proxy-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 96059fae095361a4a809c1d0551f7f33 \r\n2008.1/x86_64/apache-mod_proxy_ajp-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 472550b619cfe450b0213a89f425e569 2008.1/x86_64/apache-mod_ssl-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 04f968606fb858836fe545c73da22f90 2008.1/x86_64/apache-modules-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 6698aad880b496fde0ee007ff6fd772b \r\n2008.1/x86_64/apache-mod_userdir-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 8ecd7aabda9a445a72d7f77dfa8c27d3 2008.1/x86_64/apache-mpm-event-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 8405771cf7fb0d42979ef0e415e70051 2008.1/x86_64/apache-mpm-itk-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 6cd9e46cc4a7fb4d37711284f4d30544 \r\n2008.1/x86_64/apache-mpm-prefork-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 1876ffd0ddff17464f1a38214e636b90 \r\n2008.1/x86_64/apache-mpm-worker-2.2.8-6.2mdv2008.1.x86_64.rpm\r\n 9aa3f3e2c104ebd767449441b95c710e 2008.1/x86_64/apache-source-2.2.8-6.2mdv2008.1.x86_64.rpm \r\n 390895e36f7c0863501a429d6583ee02 2008.1/SRPMS/apache-2.2.8-6.2mdv2008.1.src.rpm\r\n\r\n Mandriva Linux 2009.0:\r\n f5f58a0c89c2a1412d7e6f7ae3eeb21e 2009.0/i586/apache-base-2.2.9-12.1mdv2009.0.i586.rpm\r\n c21f80e88b520483235280eb9b321c21 2009.0/i586/apache-devel-2.2.9-12.1mdv2009.0.i586.rpm\r\n 3fb1d9e2a8a44372c962cc377ce48c32 2009.0/i586/apache-htcacheclean-2.2.9-12.1mdv2009.0.i586.rpm\r\n f978b32b6bfd0a72b854ce65d98d0e62 \r\n2009.0/i586/apache-mod_authn_dbd-2.2.9-12.1mdv2009.0.i586.rpm\r\n 07c1790fcfb37074793bf42be9b9f7b4 2009.0/i586/apache-mod_cache-2.2.9-12.1mdv2009.0.i586.rpm\r\n 6cd562921fa4dc5a7148938450f94edc 2009.0/i586/apache-mod_dav-2.2.9-12.1mdv2009.0.i586.rpm\r\n 951b5303c7222cd2220681c57e551bee 2009.0/i586/apache-mod_dbd-2.2.9-12.1mdv2009.0.i586.rpm\r\n 04033f9a77174767d7da8c2fc1185670 2009.0/i586/apache-mod_deflate-2.2.9-12.1mdv2009.0.i586.rpm\r\n 9e68de64ce8124dbd9230b2082baab8e \r\n2009.0/i586/apache-mod_disk_cache-2.2.9-12.1mdv2009.0.i586.rpm\r\n 219673a9b2fe289a2c02ee3fab6cf474 \r\n2009.0/i586/apache-mod_file_cache-2.2.9-12.1mdv2009.0.i586.rpm\r\n f2109fa2dcf31277d7b11b8d8da224f4 2009.0/i586/apache-mod_ldap-2.2.9-12.1mdv2009.0.i586.rpm\r\n b547d59b389480a4ab28579ed241a25a \r\n2009.0/i586/apache-mod_mem_cache-2.2.9-12.1mdv2009.0.i586.rpm\r\n c98737abbd68d9adace4e532961f8f87 2009.0/i586/apache-mod_proxy-2.2.9-12.1mdv2009.0.i586.rpm\r\n d2d42c01f279e25f1c23c1d70c51debd \r\n2009.0/i586/apache-mod_proxy_ajp-2.2.9-12.1mdv2009.0.i586.rpm\r\n 696d76fe412434431686a127a81f7f46 2009.0/i586/apache-mod_ssl-2.2.9-12.1mdv2009.0.i586.rpm\r\n 3739e623b63725edb40c7aa46f6b86f3 2009.0/i586/apache-modules-2.2.9-12.1mdv2009.0.i586.rpm\r\n 4d01d05b85aa027c71ce0936fe99a1e2 2009.0/i586/apache-mod_userdir-2.2.9-12.1mdv2009.0.i586.rpm\r\n 9c3ff5431cb4358e1dc71573d0face2a 2009.0/i586/apache-mpm-event-2.2.9-12.1mdv2009.0.i586.rpm\r\n b10c0a8e41ea0e305391bd245d795882 2009.0/i586/apache-mpm-itk-2.2.9-12.1mdv2009.0.i586.rpm\r\n d6369e0e088217200fa00bd9ef1999c9 2009.0/i586/apache-mpm-peruser-2.2.9-12.1mdv2009.0.i586.rpm\r\n 18770581a55e3f9db77a1a9b40d47b49 2009.0/i586/apache-mpm-prefork-2.2.9-12.1mdv2009.0.i586.rpm\r\n 985bd691c78dcb27fe693e7e49810b7e 2009.0/i586/apache-mpm-worker-2.2.9-12.1mdv2009.0.i586.rpm\r\n eb1ddfbf93a42dcabc23da7f912f5f20 2009.0/i586/apache-source-2.2.9-12.1mdv2009.0.i586.rpm \r\n 75a1b10600fb395314915bb8c020e334 2009.0/SRPMS/apache-2.2.9-12.1mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.0/X86_64:\r\n 08dc3465f4c5fbe26ed8231de4f33be3 2009.0/x86_64/apache-base-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n efa80b6a00548eec03442fe322467743 2009.0/x86_64/apache-devel-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 943f0598d5f01c70a570cf79eedc8680 \r\n2009.0/x86_64/apache-htcacheclean-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 5d4276bb798302b9779d92c883e24de6 \r\n2009.0/x86_64/apache-mod_authn_dbd-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 52d4fb5e56dabf29f4ad58cd21c0bd8d \r\n2009.0/x86_64/apache-mod_cache-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 8c6c991fd5b6cbd09135950b9a4e2460 2009.0/x86_64/apache-mod_dav-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n f9d64aa9cbb125379c6fa9913f87ca11 2009.0/x86_64/apache-mod_dbd-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n e847248eea864cb7d451db598c2783a3 \r\n2009.0/x86_64/apache-mod_deflate-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 8988af1f9201397115a0d00e60ca4efc \r\n2009.0/x86_64/apache-mod_disk_cache-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 8befcb2c633391d8fd20221b0e265f36 \r\n2009.0/x86_64/apache-mod_file_cache-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 36f30755b2e3a5bd1ec697be6296fba9 2009.0/x86_64/apache-mod_ldap-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 8b62e969ba61a5e2de0ec7dc12ca1c24 \r\n2009.0/x86_64/apache-mod_mem_cache-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 0a3979df5f6f3e76a173cf2a8a8638fa \r\n2009.0/x86_64/apache-mod_proxy-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 7d1aee50357f5be36e11abdca18fe785 \r\n2009.0/x86_64/apache-mod_proxy_ajp-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n c131cf2c09ca22921a5b15d2c2ab3566 2009.0/x86_64/apache-mod_ssl-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 2c94cd0123f989c36c993520d2ea1b71 2009.0/x86_64/apache-modules-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n e513983425ea5859a890d6b0dfcee23c \r\n2009.0/x86_64/apache-mod_userdir-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 168e3429a4e1032de044b75f4ac64cb5 \r\n2009.0/x86_64/apache-mpm-event-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n f7c8e0390ba1f1c91768ac28e7bed4c5 2009.0/x86_64/apache-mpm-itk-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 98d5baa352557ba331e5dce98917589c \r\n2009.0/x86_64/apache-mpm-peruser-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n aeb4f9427f6a3058b9aabd8193d6f35c \r\n2009.0/x86_64/apache-mpm-prefork-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 5ecd5bd6c25ec96260a0d502384cad9b \r\n2009.0/x86_64/apache-mpm-worker-2.2.9-12.1mdv2009.0.x86_64.rpm\r\n 1547f8d49cd2cd2f284c7869b796a3cb 2009.0/x86_64/apache-source-2.2.9-12.1mdv2009.0.x86_64.rpm \r\n 75a1b10600fb395314915bb8c020e334 2009.0/SRPMS/apache-2.2.9-12.1mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.1:\r\n b03292fc7a97fed1725cc71396d46da9 2009.1/i586/apache-base-2.2.11-10.2mdv2009.1.i586.rpm\r\n d2445125ab5e6fd24d6dbf42f618cd0f 2009.1/i586/apache-devel-2.2.11-10.2mdv2009.1.i586.rpm\r\n 83c229753cd671e19b04d30e49582d10 \r\n2009.1/i586/apache-htcacheclean-2.2.11-10.2mdv2009.1.i586.rpm\r\n f661d7d25eca541c5269c12bc9972405 \r\n2009.1/i586/apache-mod_authn_dbd-2.2.11-10.2mdv2009.1.i586.rpm\r\n e529a3690c12f739f3c7d503951549f9 2009.1/i586/apache-mod_cache-2.2.11-10.2mdv2009.1.i586.rpm\r\n f9b593ce36f34777254aa818bdded51c 2009.1/i586/apache-mod_dav-2.2.11-10.2mdv2009.1.i586.rpm\r\n 91256fc2c428554069ba5be9789d8616 2009.1/i586/apache-mod_dbd-2.2.11-10.2mdv2009.1.i586.rpm\r\n e305e87a01451eca1adb54779edd2d60 2009.1/i586/apache-mod_deflate-2.2.11-10.2mdv2009.1.i586.rpm\r\n 9a3391fe2a635906603a9da61a368d53 \r\n2009.1/i586/apache-mod_disk_cache-2.2.11-10.2mdv2009.1.i586.rpm\r\n 9b42da05e60c496e36b44f71dae38aac \r\n2009.1/i586/apache-mod_file_cache-2.2.11-10.2mdv2009.1.i586.rpm\r\n 7e118876f481051a36c30dc88b7dbe2d 2009.1/i586/apache-mod_ldap-2.2.11-10.2mdv2009.1.i586.rpm\r\n a8c05b2927e1608bebde726807e6b7c6 \r\n2009.1/i586/apache-mod_mem_cache-2.2.11-10.2mdv2009.1.i586.rpm\r\n 4764061ab2d68d966f5e387884bb6b01 2009.1/i586/apache-mod_proxy-2.2.11-10.2mdv2009.1.i586.rpm\r\n f72c88fee226a8f80193c6c0a4655089 \r\n2009.1/i586/apache-mod_proxy_ajp-2.2.11-10.2mdv2009.1.i586.rpm\r\n ec20204ca3bd7f1d68ff1720b165fd48 2009.1/i586/apache-mod_ssl-2.2.11-10.2mdv2009.1.i586.rpm\r\n 286af9667a351958df0c96d0bbc235db 2009.1/i586/apache-modules-2.2.11-10.2mdv2009.1.i586.rpm\r\n 41433325d0fc4a57179a1d4c594d13ee 2009.1/i586/apache-mod_userdir-2.2.11-10.2mdv2009.1.i586.rpm\r\n f6a50a95fcb5cc97d50e72da4a1a37a6 2009.1/i586/apache-mpm-event-2.2.11-10.2mdv2009.1.i586.rpm\r\n 0ccc4ff43eb9ea1ecf2e7dd325f90970 2009.1/i586/apache-mpm-itk-2.2.11-10.2mdv2009.1.i586.rpm\r\n 2e781914e9081ae8c98b3e83498cb073 2009.1/i586/apache-mpm-peruser-2.2.11-10.2mdv2009.1.i586.rpm\r\n e1d15c81cb6838bd0948ce6e6f962298 2009.1/i586/apache-mpm-prefork-2.2.11-10.2mdv2009.1.i586.rpm\r\n d1b67faf893bde192828d4dba42ce708 2009.1/i586/apache-mpm-worker-2.2.11-10.2mdv2009.1.i586.rpm\r\n 6f9eea7dd9f37afc7f3978fda31efc45 2009.1/i586/apache-source-2.2.11-10.2mdv2009.1.i586.rpm \r\n d66bcfe03cbe2b1b4028a30db40b0856 2009.1/SRPMS/apache-2.2.11-10.2mdv2009.1.src.rpm\r\n\r\n Mandriva Linux 2009.1/X86_64:\r\n 200b79495f600ff2ffff4eb72e1faa66 2009.1/x86_64/apache-base-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n 59f0cec9b2926c01feebb6d27cae2eb1 2009.1/x86_64/apache-devel-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n 64dd88dd6ec6ce945defc17eeb5f7711 \r\n2009.1/x86_64/apache-htcacheclean-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n bd552f00fb03a86e11b80f59571164b4 \r\n2009.1/x86_64/apache-mod_authn_dbd-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n f79046ee7124b2d2baa24e1491484f7d \r\n2009.1/x86_64/apache-mod_cache-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n 9e24860e0e2a72f095bd6e1e4c73c71b 2009.1/x86_64/apache-mod_dav-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n 03c82ac06e89f2136223d090b2448431 2009.1/x86_64/apache-mod_dbd-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n bc09dfcf9b2dae0d5893f1b40ed24771 \r\n2009.1/x86_64/apache-mod_deflate-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n d41837a8f5f53cabe07e3d1e16f3cc1b \r\n2009.1/x86_64/apache-mod_disk_cache-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n 428e88e11c1464e68fef8538153250fb \r\n2009.1/x86_64/apache-mod_file_cache-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n c686ffff5e902280128d86adc90d3624 \r\n2009.1/x86_64/apache-mod_ldap-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n a9424d1658644bc11d3ae840aee47a4b \r\n2009.1/x86_64/apache-mod_mem_cache-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n f60c6c13975279d23678284044c52fbd \r\n2009.1/x86_64/apache-mod_proxy-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n caa679c2dd8c4d94e197538a01d6591c \r\n2009.1/x86_64/apache-mod_proxy_ajp-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n 4f17daca4b01e4008382a6991330ef89 2009.1/x86_64/apache-mod_ssl-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n a73f1b71c7b95d7da5f3f980396aad2e 2009.1/x86_64/apache-modules-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n cf158c4090055ee5a82afd10f66966aa \r\n2009.1/x86_64/apache-mod_userdir-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n a2438fe5b9919feec1090067f762014c \r\n2009.1/x86_64/apache-mpm-event-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n 9960c48ccb4efe92ceef0adf9b04ad1e 2009.1/x86_64/apache-mpm-itk-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n cb676a8da3cfb16ed7412c42360c1d75 \r\n2009.1/x86_64/apache-mpm-peruser-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n 01117b72e3049e83b3265f86ab4beeed \r\n2009.1/x86_64/apache-mpm-prefork-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n 0e0d1550b43745a376d39d0de418eca1 \r\n2009.1/x86_64/apache-mpm-worker-2.2.11-10.2mdv2009.1.x86_64.rpm\r\n 31985746bd9b404319b08744de30df26 2009.1/x86_64/apache-source-2.2.11-10.2mdv2009.1.x86_64.rpm \r\n d66bcfe03cbe2b1b4028a30db40b0856 2009.1/SRPMS/apache-2.2.11-10.2mdv2009.1.src.rpm\r\n\r\n Corporate 4.0:\r\n 83787e8fd0a3e591bd96e24a3ba44252 corporate/4.0/i586/apache-base-2.2.3-1.5.20060mlcs4.i586.rpm\r\n c6a35702c12b245845efdeeb1eadf297 \r\ncorporate/4.0/i586/apache-devel-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 8a302c5ff39f7519dd6e76c24acac973 \r\ncorporate/4.0/i586/apache-htcacheclean-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 25335fbd038b6c5d2458b2a44f7adb52 \r\ncorporate/4.0/i586/apache-mod_authn_dbd-2.2.3-1.5.20060mlcs4.i586.rpm\r\n beb57eedf22de94061daa257f621cda4 \r\ncorporate/4.0/i586/apache-mod_cache-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 91a0281df8a6b8fb3b9409b301588872 \r\ncorporate/4.0/i586/apache-mod_dav-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 0625359657ced4b086c098c587697389 \r\ncorporate/4.0/i586/apache-mod_dbd-2.2.3-1.5.20060mlcs4.i586.rpm\r\n d3387e48e380b83befc8320ca4b2c9b2 \r\ncorporate/4.0/i586/apache-mod_deflate-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 0b4623defe0ba2492e746ddca53ac59f \r\ncorporate/4.0/i586/apache-mod_disk_cache-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 9d171b740263d6a1df5e9a9fe2d31dc7 \r\ncorporate/4.0/i586/apache-mod_file_cache-2.2.3-1.5.20060mlcs4.i586.rpm\r\n ddc9247659e001ec3cd12854ff56f5d6 \r\ncorporate/4.0/i586/apache-mod_ldap-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 8b5e3ff50b900d727144725923a024a2 \r\ncorporate/4.0/i586/apache-mod_mem_cache-2.2.3-1.5.20060mlcs4.i586.rpm\r\n d9babff59dd5a69361e144439286ebf4 \r\ncorporate/4.0/i586/apache-mod_proxy-2.2.3-1.5.20060mlcs4.i586.rpm\r\n f99d85b533cf75e81d68198ab4ed5a3e \r\ncorporate/4.0/i586/apache-mod_proxy_ajp-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 2d3b17cfdeb079416a7e9887bbb251fe \r\ncorporate/4.0/i586/apache-mod_ssl-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 1e3c582432d7310f9ff323c007df1274 \r\ncorporate/4.0/i586/apache-modules-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 5f6e2f073c580b283375e529d10d81ea \r\ncorporate/4.0/i586/apache-mod_userdir-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 839f9f21d1f645b31b80429702fc40d6 \r\ncorporate/4.0/i586/apache-mpm-prefork-2.2.3-1.5.20060mlcs4.i586.rpm\r\n b7e3f701a42dcf688f5ac71178b17218 \r\ncorporate/4.0/i586/apache-mpm-worker-2.2.3-1.5.20060mlcs4.i586.rpm\r\n 855b162cf05323a205da9c76aac41048 \r\ncorporate/4.0/i586/apache-source-2.2.3-1.5.20060mlcs4.i586.rpm \r\n 8efd638ceb477065ff7939814ae5b554 corporate/4.0/SRPMS/apache-2.2.3-1.5.20060mlcs4.src.rpm\r\n\r\n Corporate 4.0/X86_64:\r\n 0792970f3903b9bb99fe3b0c0493331d \r\ncorporate/4.0/x86_64/apache-base-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 30b2a4f22c5f5bf38dfa3da25088e4be \r\ncorporate/4.0/x86_64/apache-devel-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 70a56d47c9368b051a7df856518c03b9 \r\ncorporate/4.0/x86_64/apache-htcacheclean-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 461617cef0d8bddcbcbf90d8be092efa \r\ncorporate/4.0/x86_64/apache-mod_authn_dbd-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 205ced66093e850c988cb18b5e10f292 \r\ncorporate/4.0/x86_64/apache-mod_cache-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 90dd6f748a9be26d78c237a28d78fff5 \r\ncorporate/4.0/x86_64/apache-mod_dav-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 708fec9fac2b9edc328b68dce4c3ead7 \r\ncorporate/4.0/x86_64/apache-mod_dbd-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n d278b8c3967a606a6986a89ca368bfa6 \r\ncorporate/4.0/x86_64/apache-mod_deflate-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n ba432100c21eaf75b1a3f2350eed1cab \r\ncorporate/4.0/x86_64/apache-mod_disk_cache-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 6df31c2766be5b73d4d8686ded4f29fb \r\ncorporate/4.0/x86_64/apache-mod_file_cache-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 28d68550f28f144528b3838a635c5f8b \r\ncorporate/4.0/x86_64/apache-mod_ldap-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 547e05295688b8cc0278e87c58676d16 \r\ncorporate/4.0/x86_64/apache-mod_mem_cache-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 19a68b39a499f3434889762ec4cb2924 \r\ncorporate/4.0/x86_64/apache-mod_proxy-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n c29ff215573e022563923c6f690c95a8 \r\ncorporate/4.0/x86_64/apache-mod_proxy_ajp-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 7f1ce8cd65deb334881bc71160f2b32d \r\ncorporate/4.0/x86_64/apache-mod_ssl-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 2a0791cbae315f13ef55722b375b26c9 \r\ncorporate/4.0/x86_64/apache-modules-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 5baa0d5c9eb378d85e59d378dafcbe07 \r\ncorporate/4.0/x86_64/apache-mod_userdir-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n 48f3aa129a03a3480b5239323b36e279 \r\ncorporate/4.0/x86_64/apache-mpm-prefork-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n a0bd0281bfbac34ccf990d4069d8d6d6 \r\ncorporate/4.0/x86_64/apache-mpm-worker-2.2.3-1.5.20060mlcs4.x86_64.rpm\r\n f150990e55649daa323f01b77e8673d2 \r\ncorporate/4.0/x86_64/apache-source-2.2.3-1.5.20060mlcs4.x86_64.rpm \r\n 8efd638ceb477065ff7939814ae5b554 corporate/4.0/SRPMS/apache-2.2.3-1.5.20060mlcs4.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFKInL8mqjQ0CJFipgRAmPGAKDfXfWbwHGcBD6v7fbvg92PBONtIwCdHplA\r\nxwyn072r7C79A0nJ352M9ls=\r\n=8RdS\r\n-----END PGP SIGNATURE-----", "published": "2009-06-01T00:00:00", "modified": "2009-06-01T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:21917", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2008-2939", "CVE-2008-1678", "CVE-2009-1195"], "type": "securityvulns", "lastseen": "2018-08-31T11:10:30", "edition": 1, "viewCount": 6, "enchantments": {"score": {"value": 7.5, "vector": "NONE", "modified": "2018-08-31T11:10:30", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-2939", "CVE-2009-1195", "CVE-2008-1678"]}, {"type": "openvas", "idList": ["OPENVAS:64140", "OPENVAS:136141256231064065", "OPENVAS:136141256231064140", "OPENVAS:1361412562310122480", "OPENVAS:64065", "OPENVAS:880683", "OPENVAS:136141256231064124", "OPENVAS:136141256231064377", "OPENVAS:1361412562310880683", "OPENVAS:64377"]}, {"type": "nessus", "idList": ["UBUNTU_USN-731-1.NASL", "SUSE9_12258.NASL", "CENTOS_RHSA-2009-1075.NASL", "REDHAT-RHSA-2009-1075.NASL", "MANDRIVA_MDVSA-2009-124.NASL", "MANDRIVA_MDVSA-2009-323.NASL", "SUSE_APACHE2-5648.NASL", "ORACLELINUX_ELSA-2009-1075.NASL", "SUSE_11_0_APACHE2-080925.NASL", "SL_20090527_HTTPD_ON_SL5_X.NASL"]}, {"type": "centos", "idList": ["CESA-2009:1075", "CESA-2008:0967"]}, {"type": "oraclelinux", "idList": ["ELSA-2008-0967", "ELSA-2009-1075"]}, {"type": "redhat", "idList": ["RHSA-2008:0966", "RHSA-2009:1156", "RHSA-2009:1155", "RHSA-2008:0967", "RHSA-2009:1075"]}, {"type": "ubuntu", "idList": ["USN-731-1"]}, {"type": "httpd", "idList": ["HTTPD:B090F624D6E5C8D80EAC520EE315082F", "HTTPD:BF4AC3838A525A5586D2635616F83B3E", "HTTPD:54489B5C624418B1219ADF0EF4175F11", "HTTPD:B50C2BDA6A4C5CD7D3B4D604ECB796ED", "HTTPD:F915F9F6E76945F3AAD5C388A33DB861"]}, {"type": "seebug", "idList": ["SSV:3804", "SSV:11668", "SSV:4254", "SSV:4786", "SSV:11501"]}, {"type": "cert", "idList": ["VU:663763"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:9203", "SECURITYVULNS:VULN:9951", "SECURITYVULNS:VULN:9145", "SECURITYVULNS:DOC:20309"]}, {"type": "freebsd", "idList": ["F1892066-0E74-11DE-92DE-000BCDC1757A"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1816-1:3AAC6"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:126851"]}, {"type": "f5", "idList": ["SOL15405"]}, {"type": "fedora", "idList": ["FEDORA:31EE01AD0FF"]}], "modified": "2018-08-31T11:10:30", "rev": 2}, "vulnersScore": 7.5}, "affectedSoftware": []}
{"cve": [{"lastseen": "2020-12-09T19:28:23", "description": "Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.", "edition": 7, "cvss3": {}, "published": "2008-08-06T18:41:00", "title": "CVE-2008-2939", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-2939"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:7.10", "cpe:/o:canonical:ubuntu_linux:6.06", "cpe:/a:apache:http_server:2.2.1", "cpe:/a:apache:http_server:2.2.9", "cpe:/a:apache:http_server:-", "cpe:/a:apache:http_server:2.2.4", "cpe:/o:opensuse:opensuse:11.0", "cpe:/o:canonical:ubuntu_linux:8.04", "cpe:/a:apache:http_server:2.2.6", "cpe:/o:opensuse:opensuse:10.2", "cpe:/a:apache:http_server:2.2.0", "cpe:/a:apache:http_server:2.0.63", "cpe:/a:apache:http_server:2.2.2", "cpe:/o:opensuse:opensuse:10.3", "cpe:/o:apple:mac_os_x:10.5.6", "cpe:/a:apache:http_server:2.2.3", "cpe:/a:apache:http_server:2.2.8"], "id": "CVE-2008-2939", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2939", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:31:18", "description": "The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.", "edition": 7, "cvss3": {}, "published": "2009-05-28T20:30:00", "title": "CVE-2009-1195", "type": "cve", "cwe": ["CWE-16"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-1195"], "modified": "2018-10-30T16:25:00", "cpe": ["cpe:/a:apache:http_server:2.2", "cpe:/a:apache:http_server:2.2.11", "cpe:/a:apache:http_server:2.2.1", "cpe:/a:apache:http_server:2.2.9", "cpe:/a:apache:http_server:-", "cpe:/a:apache:http_server:2.2.4", "cpe:/a:apache:http_server:2.2.10", "cpe:/a:apache:http_server:2.2.6", "cpe:/a:apache:http_server:2.2.7", "cpe:/a:apache:http_server:2.2.0", "cpe:/a:apache:http_server:2.2.2", "cpe:/a:apache:http_server:2.2.3", "cpe:/a:apache:http_server:2.2.8"], "id": "CVE-2009-1195", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1195", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.3:*:windows:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.2:*:windows:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:50:58", "description": "Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm.", "edition": 3, "cvss3": {}, "published": "2008-07-10T17:41:00", "title": "CVE-2008-1678", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-1678"], "modified": "2017-09-29T01:30:00", "cpe": ["cpe:/a:openssl:openssl:0.9.8h", "cpe:/a:openssl:openssl:0.9.8f", "cpe:/a:openssl:openssl:0.9.8g"], "id": "CVE-2008-1678", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1678", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2018-04-06T11:40:04", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2939", "CVE-2008-1678", "CVE-2009-1195"], "description": "The remote host is missing an update to apache\nannounced via advisory MDVSA-2009:124.", "modified": "2018-04-06T00:00:00", "published": "2009-06-05T00:00:00", "id": "OPENVAS:136141256231064140", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064140", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:124 (apache)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_124.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:124 (apache)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in apache:\n\nMemory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c\nin libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to\ncause a denial of service (memory consumption) via multiple calls, as\ndemonstrated by initial SSL client handshakes to the Apache HTTP Server\nmod_ssl that specify a compression algorithm (CVE-2008-1678). Note\nthat this security issue does not really apply as zlib compression\nis not enabled in the openssl build provided by Mandriva, but apache\nis patched to address this issue anyway (conserns 2008.1 only).\n\nCross-site scripting (XSS) vulnerability in proxy_ftp.c in the\nmod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\nin the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\nallows remote attackers to inject arbitrary web script or HTML via\nwildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this\nsecurity issue was initially addressed with MDVSA-2008:195 but the\npatch fixing the issue was added but not applied in 2009.0.\n\nThe Apache HTTP Server 2.2.11 and earlier 2.2 versions does not\nproperly handle Options=IncludesNOEXEC in the AllowOverride directive,\nwhich allows local users to gain privileges by configuring (1) Options\nIncludes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a\n.htaccess file, and then inserting an exec element in a .shtml file\n(CVE-2009-1195).\n\nThis update provides fixes for these vulnerabilities.\n\nAffected: 2008.1, 2009.0, 2009.1, Corporate 4.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:124\";\ntag_summary = \"The remote host is missing an update to apache\nannounced via advisory MDVSA-2009:124.\";\n\n \n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64140\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)\");\n script_cve_id(\"CVE-2008-1678\", \"CVE-2008-2939\", \"CVE-2009-1195\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:124 (apache)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"apache-base\", rpm:\"apache-base~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-devel\", rpm:\"apache-devel~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-htcacheclean\", rpm:\"apache-htcacheclean~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_authn_dbd\", rpm:\"apache-mod_authn_dbd~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_cache\", rpm:\"apache-mod_cache~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dav\", rpm:\"apache-mod_dav~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dbd\", rpm:\"apache-mod_dbd~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_deflate\", rpm:\"apache-mod_deflate~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_disk_cache\", rpm:\"apache-mod_disk_cache~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_file_cache\", rpm:\"apache-mod_file_cache~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ldap\", rpm:\"apache-mod_ldap~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_mem_cache\", rpm:\"apache-mod_mem_cache~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy\", rpm:\"apache-mod_proxy~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy_ajp\", rpm:\"apache-mod_proxy_ajp~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ssl\", rpm:\"apache-mod_ssl~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-modules\", rpm:\"apache-modules~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_userdir\", rpm:\"apache-mod_userdir~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-event\", rpm:\"apache-mpm-event~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-itk\", rpm:\"apache-mpm-itk~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-prefork\", rpm:\"apache-mpm-prefork~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-worker\", rpm:\"apache-mpm-worker~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-source\", rpm:\"apache-source~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-base\", rpm:\"apache-base~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-devel\", rpm:\"apache-devel~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-htcacheclean\", rpm:\"apache-htcacheclean~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_authn_dbd\", rpm:\"apache-mod_authn_dbd~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_cache\", rpm:\"apache-mod_cache~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dav\", rpm:\"apache-mod_dav~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dbd\", rpm:\"apache-mod_dbd~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_deflate\", rpm:\"apache-mod_deflate~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_disk_cache\", rpm:\"apache-mod_disk_cache~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_file_cache\", rpm:\"apache-mod_file_cache~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ldap\", rpm:\"apache-mod_ldap~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_mem_cache\", rpm:\"apache-mod_mem_cache~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy\", rpm:\"apache-mod_proxy~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy_ajp\", rpm:\"apache-mod_proxy_ajp~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ssl\", rpm:\"apache-mod_ssl~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-modules\", rpm:\"apache-modules~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_userdir\", rpm:\"apache-mod_userdir~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-event\", rpm:\"apache-mpm-event~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-itk\", rpm:\"apache-mpm-itk~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-peruser\", rpm:\"apache-mpm-peruser~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-prefork\", rpm:\"apache-mpm-prefork~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-worker\", rpm:\"apache-mpm-worker~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-source\", rpm:\"apache-source~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-base\", rpm:\"apache-base~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-devel\", rpm:\"apache-devel~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-htcacheclean\", rpm:\"apache-htcacheclean~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_authn_dbd\", rpm:\"apache-mod_authn_dbd~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_cache\", rpm:\"apache-mod_cache~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dav\", rpm:\"apache-mod_dav~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dbd\", rpm:\"apache-mod_dbd~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_deflate\", rpm:\"apache-mod_deflate~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_disk_cache\", rpm:\"apache-mod_disk_cache~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_file_cache\", rpm:\"apache-mod_file_cache~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ldap\", rpm:\"apache-mod_ldap~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_mem_cache\", rpm:\"apache-mod_mem_cache~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy\", rpm:\"apache-mod_proxy~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy_ajp\", rpm:\"apache-mod_proxy_ajp~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ssl\", rpm:\"apache-mod_ssl~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-modules\", rpm:\"apache-modules~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_userdir\", rpm:\"apache-mod_userdir~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-event\", rpm:\"apache-mpm-event~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-itk\", rpm:\"apache-mpm-itk~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-peruser\", rpm:\"apache-mpm-peruser~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-prefork\", rpm:\"apache-mpm-prefork~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-worker\", rpm:\"apache-mpm-worker~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-source\", rpm:\"apache-source~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-base\", rpm:\"apache-base~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-devel\", rpm:\"apache-devel~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-htcacheclean\", rpm:\"apache-htcacheclean~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_authn_dbd\", rpm:\"apache-mod_authn_dbd~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_cache\", rpm:\"apache-mod_cache~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dav\", rpm:\"apache-mod_dav~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dbd\", rpm:\"apache-mod_dbd~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_deflate\", rpm:\"apache-mod_deflate~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_disk_cache\", rpm:\"apache-mod_disk_cache~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_file_cache\", rpm:\"apache-mod_file_cache~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ldap\", rpm:\"apache-mod_ldap~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_mem_cache\", rpm:\"apache-mod_mem_cache~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy\", rpm:\"apache-mod_proxy~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy_ajp\", rpm:\"apache-mod_proxy_ajp~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ssl\", rpm:\"apache-mod_ssl~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-modules\", rpm:\"apache-modules~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_userdir\", rpm:\"apache-mod_userdir~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-prefork\", rpm:\"apache-mpm-prefork~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-worker\", rpm:\"apache-mpm-worker~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-source\", rpm:\"apache-source~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:40:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2939", "CVE-2008-1678", "CVE-2009-1195"], "description": "The remote host is missing an update to apache\nannounced via advisory MDVSA-2009:124-1.", "modified": "2018-04-06T00:00:00", "published": "2009-07-15T00:00:00", "id": "OPENVAS:136141256231064377", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064377", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:124-1 (apache)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_124_1.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:124-1 (apache)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in apache:\n\nMemory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c\nin libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to\ncause a denial of service (memory consumption) via multiple calls, as\ndemonstrated by initial SSL client handshakes to the Apache HTTP Server\nmod_ssl that specify a compression algorithm (CVE-2008-1678). Note\nthat this security issue does not really apply as zlib compression\nis not enabled in the openssl build provided by Mandriva, but apache\nis patched to address this issue anyway (concerns 2008.1 only).\n\nCross-site scripting (XSS) vulnerability in proxy_ftp.c in the\nmod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\nin the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\nallows remote attackers to inject arbitrary web script or HTML via\nwildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this\nsecurity issue was initially addressed with MDVSA-2008:195 but the\npatch fixing the issue was added but not applied in 2009.0.\n\nThe Apache HTTP Server 2.2.11 and earlier 2.2 versions does not\nproperly handle Options=IncludesNOEXEC in the AllowOverride directive,\nwhich allows local users to gain privileges by configuring (1) Options\nIncludes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a\n.htaccess file, and then inserting an exec element in a .shtml file\n(CVE-2009-1195).\n\nThis update provides fixes for these vulnerabilities.\n\nUpdate:\n\nThe patch for fixing CVE-2009-1195 for Mandriva Linux 2008.1 was\nincomplete, this update addresses the problem.\n\nAffected: 2008.1\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:124-1\";\ntag_summary = \"The remote host is missing an update to apache\nannounced via advisory MDVSA-2009:124-1.\";\n\n \n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64377\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-07-15 04:21:35 +0200 (Wed, 15 Jul 2009)\");\n script_cve_id(\"CVE-2008-1678\", \"CVE-2008-2939\", \"CVE-2009-1195\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:124-1 (apache)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"apache-base\", rpm:\"apache-base~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-devel\", rpm:\"apache-devel~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-htcacheclean\", rpm:\"apache-htcacheclean~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_authn_dbd\", rpm:\"apache-mod_authn_dbd~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_cache\", rpm:\"apache-mod_cache~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dav\", rpm:\"apache-mod_dav~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dbd\", rpm:\"apache-mod_dbd~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_deflate\", rpm:\"apache-mod_deflate~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_disk_cache\", rpm:\"apache-mod_disk_cache~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_file_cache\", rpm:\"apache-mod_file_cache~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ldap\", rpm:\"apache-mod_ldap~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_mem_cache\", rpm:\"apache-mod_mem_cache~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy\", rpm:\"apache-mod_proxy~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy_ajp\", rpm:\"apache-mod_proxy_ajp~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ssl\", rpm:\"apache-mod_ssl~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-modules\", rpm:\"apache-modules~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_userdir\", rpm:\"apache-mod_userdir~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-event\", rpm:\"apache-mpm-event~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-itk\", rpm:\"apache-mpm-itk~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-prefork\", rpm:\"apache-mpm-prefork~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-worker\", rpm:\"apache-mpm-worker~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-source\", rpm:\"apache-source~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:57:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2939", "CVE-2008-1678", "CVE-2009-1195"], "description": "The remote host is missing an update to apache\nannounced via advisory MDVSA-2009:124-1.", "modified": "2017-07-06T00:00:00", "published": "2009-07-15T00:00:00", "id": "OPENVAS:64377", "href": "http://plugins.openvas.org/nasl.php?oid=64377", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:124-1 (apache)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_124_1.nasl 6573 2017-07-06 13:10:50Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:124-1 (apache)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in apache:\n\nMemory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c\nin libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to\ncause a denial of service (memory consumption) via multiple calls, as\ndemonstrated by initial SSL client handshakes to the Apache HTTP Server\nmod_ssl that specify a compression algorithm (CVE-2008-1678). Note\nthat this security issue does not really apply as zlib compression\nis not enabled in the openssl build provided by Mandriva, but apache\nis patched to address this issue anyway (concerns 2008.1 only).\n\nCross-site scripting (XSS) vulnerability in proxy_ftp.c in the\nmod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\nin the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\nallows remote attackers to inject arbitrary web script or HTML via\nwildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this\nsecurity issue was initially addressed with MDVSA-2008:195 but the\npatch fixing the issue was added but not applied in 2009.0.\n\nThe Apache HTTP Server 2.2.11 and earlier 2.2 versions does not\nproperly handle Options=IncludesNOEXEC in the AllowOverride directive,\nwhich allows local users to gain privileges by configuring (1) Options\nIncludes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a\n.htaccess file, and then inserting an exec element in a .shtml file\n(CVE-2009-1195).\n\nThis update provides fixes for these vulnerabilities.\n\nUpdate:\n\nThe patch for fixing CVE-2009-1195 for Mandriva Linux 2008.1 was\nincomplete, this update addresses the problem.\n\nAffected: 2008.1\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:124-1\";\ntag_summary = \"The remote host is missing an update to apache\nannounced via advisory MDVSA-2009:124-1.\";\n\n \n\nif(description)\n{\n script_id(64377);\n script_version(\"$Revision: 6573 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:10:50 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-07-15 04:21:35 +0200 (Wed, 15 Jul 2009)\");\n script_cve_id(\"CVE-2008-1678\", \"CVE-2008-2939\", \"CVE-2009-1195\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:124-1 (apache)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"apache-base\", rpm:\"apache-base~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-devel\", rpm:\"apache-devel~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-htcacheclean\", rpm:\"apache-htcacheclean~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_authn_dbd\", rpm:\"apache-mod_authn_dbd~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_cache\", rpm:\"apache-mod_cache~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dav\", rpm:\"apache-mod_dav~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dbd\", rpm:\"apache-mod_dbd~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_deflate\", rpm:\"apache-mod_deflate~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_disk_cache\", rpm:\"apache-mod_disk_cache~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_file_cache\", rpm:\"apache-mod_file_cache~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ldap\", rpm:\"apache-mod_ldap~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_mem_cache\", rpm:\"apache-mod_mem_cache~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy\", rpm:\"apache-mod_proxy~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy_ajp\", rpm:\"apache-mod_proxy_ajp~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ssl\", rpm:\"apache-mod_ssl~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-modules\", rpm:\"apache-modules~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_userdir\", rpm:\"apache-mod_userdir~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-event\", rpm:\"apache-mpm-event~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-itk\", rpm:\"apache-mpm-itk~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-prefork\", rpm:\"apache-mpm-prefork~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-worker\", rpm:\"apache-mpm-worker~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-source\", rpm:\"apache-source~2.2.8~6.4mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:57:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2939", "CVE-2008-1678", "CVE-2009-1195"], "description": "The remote host is missing an update to apache\nannounced via advisory MDVSA-2009:124.", "modified": "2017-07-06T00:00:00", "published": "2009-06-05T00:00:00", "id": "OPENVAS:64140", "href": "http://plugins.openvas.org/nasl.php?oid=64140", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:124 (apache)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_124.nasl 6573 2017-07-06 13:10:50Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:124 (apache)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in apache:\n\nMemory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c\nin libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to\ncause a denial of service (memory consumption) via multiple calls, as\ndemonstrated by initial SSL client handshakes to the Apache HTTP Server\nmod_ssl that specify a compression algorithm (CVE-2008-1678). Note\nthat this security issue does not really apply as zlib compression\nis not enabled in the openssl build provided by Mandriva, but apache\nis patched to address this issue anyway (conserns 2008.1 only).\n\nCross-site scripting (XSS) vulnerability in proxy_ftp.c in the\nmod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\nin the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\nallows remote attackers to inject arbitrary web script or HTML via\nwildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this\nsecurity issue was initially addressed with MDVSA-2008:195 but the\npatch fixing the issue was added but not applied in 2009.0.\n\nThe Apache HTTP Server 2.2.11 and earlier 2.2 versions does not\nproperly handle Options=IncludesNOEXEC in the AllowOverride directive,\nwhich allows local users to gain privileges by configuring (1) Options\nIncludes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a\n.htaccess file, and then inserting an exec element in a .shtml file\n(CVE-2009-1195).\n\nThis update provides fixes for these vulnerabilities.\n\nAffected: 2008.1, 2009.0, 2009.1, Corporate 4.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:124\";\ntag_summary = \"The remote host is missing an update to apache\nannounced via advisory MDVSA-2009:124.\";\n\n \n\nif(description)\n{\n script_id(64140);\n script_version(\"$Revision: 6573 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:10:50 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)\");\n script_cve_id(\"CVE-2008-1678\", \"CVE-2008-2939\", \"CVE-2009-1195\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:124 (apache)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"apache-base\", rpm:\"apache-base~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-devel\", rpm:\"apache-devel~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-htcacheclean\", rpm:\"apache-htcacheclean~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_authn_dbd\", rpm:\"apache-mod_authn_dbd~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_cache\", rpm:\"apache-mod_cache~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dav\", rpm:\"apache-mod_dav~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dbd\", rpm:\"apache-mod_dbd~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_deflate\", rpm:\"apache-mod_deflate~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_disk_cache\", rpm:\"apache-mod_disk_cache~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_file_cache\", rpm:\"apache-mod_file_cache~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ldap\", rpm:\"apache-mod_ldap~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_mem_cache\", rpm:\"apache-mod_mem_cache~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy\", rpm:\"apache-mod_proxy~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy_ajp\", rpm:\"apache-mod_proxy_ajp~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ssl\", rpm:\"apache-mod_ssl~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-modules\", rpm:\"apache-modules~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_userdir\", rpm:\"apache-mod_userdir~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-event\", rpm:\"apache-mpm-event~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-itk\", rpm:\"apache-mpm-itk~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-prefork\", rpm:\"apache-mpm-prefork~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-worker\", rpm:\"apache-mpm-worker~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-source\", rpm:\"apache-source~2.2.8~6.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-base\", rpm:\"apache-base~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-devel\", rpm:\"apache-devel~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-htcacheclean\", rpm:\"apache-htcacheclean~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_authn_dbd\", rpm:\"apache-mod_authn_dbd~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_cache\", rpm:\"apache-mod_cache~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dav\", rpm:\"apache-mod_dav~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dbd\", rpm:\"apache-mod_dbd~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_deflate\", rpm:\"apache-mod_deflate~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_disk_cache\", rpm:\"apache-mod_disk_cache~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_file_cache\", rpm:\"apache-mod_file_cache~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ldap\", rpm:\"apache-mod_ldap~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_mem_cache\", rpm:\"apache-mod_mem_cache~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy\", rpm:\"apache-mod_proxy~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy_ajp\", rpm:\"apache-mod_proxy_ajp~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ssl\", rpm:\"apache-mod_ssl~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-modules\", rpm:\"apache-modules~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_userdir\", rpm:\"apache-mod_userdir~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-event\", rpm:\"apache-mpm-event~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-itk\", rpm:\"apache-mpm-itk~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-peruser\", rpm:\"apache-mpm-peruser~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-prefork\", rpm:\"apache-mpm-prefork~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-worker\", rpm:\"apache-mpm-worker~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-source\", rpm:\"apache-source~2.2.9~12.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-base\", rpm:\"apache-base~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-devel\", rpm:\"apache-devel~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-htcacheclean\", rpm:\"apache-htcacheclean~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_authn_dbd\", rpm:\"apache-mod_authn_dbd~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_cache\", rpm:\"apache-mod_cache~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dav\", rpm:\"apache-mod_dav~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dbd\", rpm:\"apache-mod_dbd~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_deflate\", rpm:\"apache-mod_deflate~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_disk_cache\", rpm:\"apache-mod_disk_cache~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_file_cache\", rpm:\"apache-mod_file_cache~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ldap\", rpm:\"apache-mod_ldap~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_mem_cache\", rpm:\"apache-mod_mem_cache~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy\", rpm:\"apache-mod_proxy~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy_ajp\", rpm:\"apache-mod_proxy_ajp~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ssl\", rpm:\"apache-mod_ssl~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-modules\", rpm:\"apache-modules~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_userdir\", rpm:\"apache-mod_userdir~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-event\", rpm:\"apache-mpm-event~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-itk\", rpm:\"apache-mpm-itk~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-peruser\", rpm:\"apache-mpm-peruser~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-prefork\", rpm:\"apache-mpm-prefork~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-worker\", rpm:\"apache-mpm-worker~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-source\", rpm:\"apache-source~2.2.11~10.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-base\", rpm:\"apache-base~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-devel\", rpm:\"apache-devel~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-htcacheclean\", rpm:\"apache-htcacheclean~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_authn_dbd\", rpm:\"apache-mod_authn_dbd~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_cache\", rpm:\"apache-mod_cache~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dav\", rpm:\"apache-mod_dav~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_dbd\", rpm:\"apache-mod_dbd~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_deflate\", rpm:\"apache-mod_deflate~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_disk_cache\", rpm:\"apache-mod_disk_cache~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_file_cache\", rpm:\"apache-mod_file_cache~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ldap\", rpm:\"apache-mod_ldap~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_mem_cache\", rpm:\"apache-mod_mem_cache~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy\", rpm:\"apache-mod_proxy~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_proxy_ajp\", rpm:\"apache-mod_proxy_ajp~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_ssl\", rpm:\"apache-mod_ssl~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-modules\", rpm:\"apache-modules~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mod_userdir\", rpm:\"apache-mod_userdir~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-prefork\", rpm:\"apache-mpm-prefork~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-mpm-worker\", rpm:\"apache-mpm-worker~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"apache-source\", rpm:\"apache-source~2.2.3~1.5.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:1361412562310880683", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880683", "type": "openvas", "title": "CentOS Update for httpd CESA-2009:1075 centos5 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for httpd CESA-2009:1075 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2009-May/015953.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880683\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name:\"CESA\", value:\"2009:1075\");\n script_cve_id(\"CVE-2008-1678\", \"CVE-2009-1195\");\n script_name(\"CentOS Update for httpd CESA-2009:1075 centos5 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'httpd'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"httpd on CentOS 5\");\n script_tag(name:\"insight\", value:\"The Apache HTTP Server is a popular and freely-available Web server.\n\n A flaw was found in the handling of compression structures between mod_ssl\n and OpenSSL. If too many connections were opened in a short period of time,\n all system memory and swap space would be consumed by httpd, negatively\n impacting other processes, or causing a system crash. (CVE-2008-1678)\n\n Note: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux 5\n prior to 5.3. The problem was introduced via the RHBA-2009:0181 errata in\n Red Hat Enterprise Linux 5.3, which upgraded OpenSSL to the newer 0.9.8e\n version.\n\n A flaw was found in the handling of the 'Options' and 'AllowOverride'\n directives. In configurations using the 'AllowOverride' directive with\n certain 'Options=' arguments, local users were not restricted from\n executing commands from a Server-Side-Include script as intended.\n (CVE-2009-1195)\n\n All httpd users should upgrade to these updated packages, which contain\n backported patches to resolve these issues. Users must restart httpd for\n this update to take effect.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"httpd\", rpm:\"httpd~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"httpd-devel\", rpm:\"httpd-devel~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"httpd-manual\", rpm:\"httpd-manual~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mod_ssl\", rpm:\"mod_ssl~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-25T10:56:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "description": "The remote host is missing updates to httpd announced in\nadvisory CESA-2009:1075.", "modified": "2017-07-10T00:00:00", "published": "2009-06-05T00:00:00", "id": "OPENVAS:64124", "href": "http://plugins.openvas.org/nasl.php?oid=64124", "type": "openvas", "title": "CentOS Security Advisory CESA-2009:1075 (httpd)", "sourceData": "#CESA-2009:1075 64124 2\n# $Id: ovcesa2009_1075.nasl 6650 2017-07-10 11:43:12Z cfischer $\n# Description: Auto-generated from advisory CESA-2009:1075 (httpd)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"For details on the issues addressed in this update,\nplease visit the referenced security advisories.\";\ntag_solution = \"Update the appropriate packages on your system.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1075\nhttp://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1075\nhttps://rhn.redhat.com/errata/RHSA-2009-1075.html\";\ntag_summary = \"The remote host is missing updates to httpd announced in\nadvisory CESA-2009:1075.\";\n\n\n\nif(description)\n{\n script_id(64124);\n script_version(\"$Revision: 6650 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:43:12 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)\");\n script_cve_id(\"CVE-2008-1678\", \"CVE-2009-1195\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"CentOS Security Advisory CESA-2009:1075 (httpd)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"httpd\", rpm:\"httpd~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"httpd-devel\", rpm:\"httpd-devel~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"httpd-manual\", rpm:\"httpd-manual~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mod_ssl\", rpm:\"mod_ssl~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:36:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "description": "Oracle Linux Local Security Checks ELSA-2009-1075", "modified": "2018-09-28T00:00:00", "published": "2015-10-08T00:00:00", "id": "OPENVAS:1361412562310122480", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122480", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2009-1075", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2009-1075.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122480\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-08 14:46:17 +0300 (Thu, 08 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2009-1075\");\n script_tag(name:\"insight\", value:\"ELSA-2009-1075 - httpd security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2009-1075\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2009-1075.html\");\n script_cve_id(\"CVE-2008-1678\", \"CVE-2009-1195\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"httpd\", rpm:\"httpd~2.2.3~22.0.1.el5_3.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"httpd-devel\", rpm:\"httpd-devel~2.2.3~22.0.1.el5_3.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"httpd-manual\", rpm:\"httpd-manual~2.2.3~22.0.1.el5_3.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mod_ssl\", rpm:\"mod_ssl~2.2.3~22.0.1.el5_3.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2018-04-06T11:37:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "description": "The remote host is missing updates to httpd announced in\nadvisory CESA-2009:1075.", "modified": "2018-04-06T00:00:00", "published": "2009-06-05T00:00:00", "id": "OPENVAS:136141256231064124", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064124", "type": "openvas", "title": "CentOS Security Advisory CESA-2009:1075 (httpd)", "sourceData": "#CESA-2009:1075 64124 2\n# $Id: ovcesa2009_1075.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory CESA-2009:1075 (httpd)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"For details on the issues addressed in this update,\nplease visit the referenced security advisories.\";\ntag_solution = \"Update the appropriate packages on your system.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1075\nhttp://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1075\nhttps://rhn.redhat.com/errata/RHSA-2009-1075.html\";\ntag_summary = \"The remote host is missing updates to httpd announced in\nadvisory CESA-2009:1075.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64124\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)\");\n script_cve_id(\"CVE-2008-1678\", \"CVE-2009-1195\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"CentOS Security Advisory CESA-2009:1075 (httpd)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"httpd\", rpm:\"httpd~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"httpd-devel\", rpm:\"httpd-devel~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"httpd-manual\", rpm:\"httpd-manual~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mod_ssl\", rpm:\"mod_ssl~2.2.3~22.el5.centos.1\", rls:\"CentOS5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-27T10:56:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:1075.\n\nThe Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between mod_ssl\nand OpenSSL. If too many connections were opened in a short period of time,\nall system memory and swap space would be consumed by httpd, negatively\nimpacting other processes, or causing a system crash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux 5\nprior to 5.3. The problem was introduced via the RHBA-2009:0181 errata in\nRed Hat Enterprise Linux 5.3, which upgraded OpenSSL to the newer 0.9.8e\nversion.\n\nA flaw was found in the handling of the Options and AllowOverride\ndirectives. In configurations using the AllowOverride directive with\ncertain Options= arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Users must restart httpd for\nthis update to take effect.", "modified": "2017-07-12T00:00:00", "published": "2009-06-05T00:00:00", "id": "OPENVAS:64065", "href": "http://plugins.openvas.org/nasl.php?oid=64065", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:1075", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_1075.nasl 6683 2017-07-12 09:41:57Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:1075 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:1075.\n\nThe Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between mod_ssl\nand OpenSSL. If too many connections were opened in a short period of time,\nall system memory and swap space would be consumed by httpd, negatively\nimpacting other processes, or causing a system crash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux 5\nprior to 5.3. The problem was introduced via the RHBA-2009:0181 errata in\nRed Hat Enterprise Linux 5.3, which upgraded OpenSSL to the newer 0.9.8e\nversion.\n\nA flaw was found in the handling of the Options and AllowOverride\ndirectives. In configurations using the AllowOverride directive with\ncertain Options= arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Users must restart httpd for\nthis update to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_id(64065);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)\");\n script_cve_id(\"CVE-2008-1678\", \"CVE-2009-1195\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"RedHat Security Advisory RHSA-2009:1075\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-1075.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#moderate\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"httpd\", rpm:\"httpd~2.2.3~22.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"httpd-debuginfo\", rpm:\"httpd-debuginfo~2.2.3~22.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mod_ssl\", rpm:\"mod_ssl~2.2.3~22.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"httpd-devel\", rpm:\"httpd-devel~2.2.3~22.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"httpd-manual\", rpm:\"httpd-manual~2.2.3~22.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:40:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:1075.\n\nThe Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between mod_ssl\nand OpenSSL. If too many connections were opened in a short period of time,\nall system memory and swap space would be consumed by httpd, negatively\nimpacting other processes, or causing a system crash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux 5\nprior to 5.3. The problem was introduced via the RHBA-2009:0181 errata in\nRed Hat Enterprise Linux 5.3, which upgraded OpenSSL to the newer 0.9.8e\nversion.\n\nA flaw was found in the handling of the Options and AllowOverride\ndirectives. In configurations using the AllowOverride directive with\ncertain Options= arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Users must restart httpd for\nthis update to take effect.", "modified": "2018-04-06T00:00:00", "published": "2009-06-05T00:00:00", "id": "OPENVAS:136141256231064065", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064065", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:1075", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_1075.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:1075 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:1075.\n\nThe Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between mod_ssl\nand OpenSSL. If too many connections were opened in a short period of time,\nall system memory and swap space would be consumed by httpd, negatively\nimpacting other processes, or causing a system crash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux 5\nprior to 5.3. The problem was introduced via the RHBA-2009:0181 errata in\nRed Hat Enterprise Linux 5.3, which upgraded OpenSSL to the newer 0.9.8e\nversion.\n\nA flaw was found in the handling of the Options and AllowOverride\ndirectives. In configurations using the AllowOverride directive with\ncertain Options= arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Users must restart httpd for\nthis update to take effect.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64065\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)\");\n script_cve_id(\"CVE-2008-1678\", \"CVE-2009-1195\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"RedHat Security Advisory RHSA-2009:1075\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-1075.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#moderate\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"httpd\", rpm:\"httpd~2.2.3~22.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"httpd-debuginfo\", rpm:\"httpd-debuginfo~2.2.3~22.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mod_ssl\", rpm:\"mod_ssl~2.2.3~22.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"httpd-devel\", rpm:\"httpd-devel~2.2.3~22.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"httpd-manual\", rpm:\"httpd-manual~2.2.3~22.el5_3.1\", rls:\"RHENT_5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-01-07T11:52:09", "description": "Multiple vulnerabilities has been found and corrected in apache :\n\nMemory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c\nin libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to\ncause a denial of service (memory consumption) via multiple calls, as\ndemonstrated by initial SSL client handshakes to the Apache HTTP\nServer mod_ssl that specify a compression algorithm (CVE-2008-1678).\nNote that this security issue does not really apply as zlib\ncompression is not enabled in the openssl build provided by Mandriva,\nbut apache is patched to address this issue anyway (conserns 2008.1\nonly).\n\nCross-site scripting (XSS) vulnerability in proxy_ftp.c in the\nmod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\nin the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\nallows remote attackers to inject arbitrary web script or HTML via\nwildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this\nsecurity issue was initially addressed with MDVSA-2008:195 but the\npatch fixing the issue was added but not applied in 2009.0.\n\nThe Apache HTTP Server 2.2.11 and earlier 2.2 versions does not\nproperly handle Options=IncludesNOEXEC in the AllowOverride directive,\nwhich allows local users to gain privileges by configuring (1) Options\nIncludes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a\n.htaccess file, and then inserting an exec element in a .shtml file\n(CVE-2009-1195).\n\nThis update provides fixes for these vulnerabilities.\n\nUpdate :\n\nThe patch for fixing CVE-2009-1195 for Mandriva Linux 2008.1 was\nincomplete, this update addresses the problem.", "edition": 26, "published": "2009-06-01T00:00:00", "title": "Mandriva Linux Security Advisory : apache (MDVSA-2009:124-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2939", "CVE-2008-1678", "CVE-2009-1195"], "modified": "2009-06-01T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:apache-mpm-worker", "p-cpe:/a:mandriva:linux:apache-mod_ssl", "p-cpe:/a:mandriva:linux:apache-mod_ldap", "p-cpe:/a:mandriva:linux:apache-mpm-event", "p-cpe:/a:mandriva:linux:apache-modules", "p-cpe:/a:mandriva:linux:apache-htcacheclean", "p-cpe:/a:mandriva:linux:apache-devel", "cpe:/o:mandriva:linux:2008.1", "p-cpe:/a:mandriva:linux:apache-mod_dav", "p-cpe:/a:mandriva:linux:apache-mod_dbd", "p-cpe:/a:mandriva:linux:apache-mod_mem_cache", "p-cpe:/a:mandriva:linux:apache-mod_proxy", "p-cpe:/a:mandriva:linux:apache-mod_file_cache", "p-cpe:/a:mandriva:linux:apache-mod_authn_dbd", "p-cpe:/a:mandriva:linux:apache-source", "p-cpe:/a:mandriva:linux:apache-base", "p-cpe:/a:mandriva:linux:apache-mod_deflate", "p-cpe:/a:mandriva:linux:apache-mod_proxy_ajp", "p-cpe:/a:mandriva:linux:apache-mod_disk_cache", "p-cpe:/a:mandriva:linux:apache-mpm-itk", "p-cpe:/a:mandriva:linux:apache-mpm-prefork", "p-cpe:/a:mandriva:linux:apache-mod_cache", "p-cpe:/a:mandriva:linux:apache-mod_userdir"], "id": "MANDRIVA_MDVSA-2009-124.NASL", "href": "https://www.tenable.com/plugins/nessus/39761", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2009:124. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(39761);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2008-1678\", \"CVE-2008-2939\", \"CVE-2009-1195\");\n script_bugtraq_id(30560, 31692, 35115);\n script_xref(name:\"MDVSA\", value:\"2009:124-1\");\n\n script_name(english:\"Mandriva Linux Security Advisory : apache (MDVSA-2009:124-1)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities has been found and corrected in apache :\n\nMemory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c\nin libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to\ncause a denial of service (memory consumption) via multiple calls, as\ndemonstrated by initial SSL client handshakes to the Apache HTTP\nServer mod_ssl that specify a compression algorithm (CVE-2008-1678).\nNote that this security issue does not really apply as zlib\ncompression is not enabled in the openssl build provided by Mandriva,\nbut apache is patched to address this issue anyway (conserns 2008.1\nonly).\n\nCross-site scripting (XSS) vulnerability in proxy_ftp.c in the\nmod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\nin the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\nallows remote attackers to inject arbitrary web script or HTML via\nwildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this\nsecurity issue was initially addressed with MDVSA-2008:195 but the\npatch fixing the issue was added but not applied in 2009.0.\n\nThe Apache HTTP Server 2.2.11 and earlier 2.2 versions does not\nproperly handle Options=IncludesNOEXEC in the AllowOverride directive,\nwhich allows local users to gain privileges by configuring (1) Options\nIncludes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a\n.htaccess file, and then inserting an exec element in a .shtml file\n(CVE-2009-1195).\n\nThis update provides fixes for these vulnerabilities.\n\nUpdate :\n\nThe patch for fixing CVE-2009-1195 for Mandriva Linux 2008.1 was\nincomplete, this update addresses the problem.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(16, 79, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-htcacheclean\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_authn_dbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_cache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_dav\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_dbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_deflate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_disk_cache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_file_cache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_mem_cache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_proxy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_proxy_ajp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_ssl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_userdir\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mpm-event\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mpm-itk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mpm-prefork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mpm-worker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-source\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/07/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/06/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-base-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-devel-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-htcacheclean-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_authn_dbd-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_cache-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_dav-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_dbd-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_deflate-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_disk_cache-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_file_cache-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_ldap-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_mem_cache-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_proxy-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_proxy_ajp-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_ssl-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mod_userdir-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-modules-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mpm-event-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mpm-itk-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mpm-prefork-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-mpm-worker-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"apache-source-2.2.8-6.4mdv2008.1\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T13:44:19", "description": "A flaw was found in the handling of compression structures between\nmod_ssl and OpenSSL. If too many connections were opened in a short\nperiod of time, all system memory and swap space would be consumed by\nhttpd, negatively impacting other processes, or causing a system\ncrash. (CVE-2008-1678)\n\nA flaw was found in the handling of the 'Options' and 'AllowOverride'\ndirectives. In configurations using the 'AllowOverride' directive with\ncertain 'Options=' arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nUsers must restart httpd for this update to take effect.", "edition": 26, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : httpd on SL5.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20090527_HTTPD_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60591", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60591);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-1678\", \"CVE-2009-1195\");\n\n script_name(english:\"Scientific Linux Security Update : httpd on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in the handling of compression structures between\nmod_ssl and OpenSSL. If too many connections were opened in a short\nperiod of time, all system memory and swap space would be consumed by\nhttpd, negatively impacting other processes, or causing a system\ncrash. (CVE-2008-1678)\n\nA flaw was found in the handling of the 'Options' and 'AllowOverride'\ndirectives. In configurations using the 'AllowOverride' directive with\ncertain 'Options=' arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nUsers must restart httpd for this update to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0905&L=scientific-linux-errata&T=0&P=2175\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?63e6f6d3\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(16, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/05/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"httpd-2.2.3-22.sl5.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"httpd-devel-2.2.3-22.sl5.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"httpd-manual-2.2.3-22.sl5.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"mod_ssl-2.2.3-22.sl5.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T13:06:46", "description": "Updated httpd packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between\nmod_ssl and OpenSSL. If too many connections were opened in a short\nperiod of time, all system memory and swap space would be consumed by\nhttpd, negatively impacting other processes, or causing a system\ncrash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux\n5 prior to 5.3. The problem was introduced via the RHBA-2009:0181\nerrata in Red Hat Enterprise Linux 5.3, which upgraded OpenSSL to the\nnewer 0.9.8e version.\n\nA flaw was found in the handling of the 'Options' and 'AllowOverride'\ndirectives. In configurations using the 'AllowOverride' directive with\ncertain 'Options=' arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which\ncontain backported patches to resolve these issues. Users must restart\nhttpd for this update to take effect.", "edition": 28, "published": "2009-05-28T00:00:00", "title": "RHEL 5 : httpd (RHSA-2009:1075)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "modified": "2009-05-28T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:mod_ssl", "cpe:/o:redhat:enterprise_linux:5", "cpe:/o:redhat:enterprise_linux:5.3", "p-cpe:/a:redhat:enterprise_linux:httpd", "p-cpe:/a:redhat:enterprise_linux:httpd-manual", "p-cpe:/a:redhat:enterprise_linux:httpd-devel"], "id": "REDHAT-RHSA-2009-1075.NASL", "href": "https://www.tenable.com/plugins/nessus/38945", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2009:1075. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(38945);\n script_version(\"1.25\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-1678\", \"CVE-2009-1195\");\n script_bugtraq_id(31692);\n script_xref(name:\"RHSA\", value:\"2009:1075\");\n\n script_name(english:\"RHEL 5 : httpd (RHSA-2009:1075)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated httpd packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between\nmod_ssl and OpenSSL. If too many connections were opened in a short\nperiod of time, all system memory and swap space would be consumed by\nhttpd, negatively impacting other processes, or causing a system\ncrash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux\n5 prior to 5.3. The problem was introduced via the RHBA-2009:0181\nerrata in Red Hat Enterprise Linux 5.3, which upgraded OpenSSL to the\nnewer 0.9.8e version.\n\nA flaw was found in the handling of the 'Options' and 'AllowOverride'\ndirectives. In configurations using the 'AllowOverride' directive with\ncertain 'Options=' arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which\ncontain backported patches to resolve these issues. Users must restart\nhttpd for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-1678\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-1195\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2009:1075\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(16, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:httpd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:httpd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:httpd-manual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mod_ssl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/07/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/05/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/05/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2009:1075\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"httpd-2.2.3-22.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"httpd-2.2.3-22.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"httpd-2.2.3-22.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"httpd-devel-2.2.3-22.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"httpd-manual-2.2.3-22.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"httpd-manual-2.2.3-22.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"httpd-manual-2.2.3-22.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"mod_ssl-2.2.3-22.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"mod_ssl-2.2.3-22.el5_3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"mod_ssl-2.2.3-22.el5_3.1\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"httpd / httpd-devel / httpd-manual / mod_ssl\");\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-06T09:25:44", "description": "Updated httpd packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between\nmod_ssl and OpenSSL. If too many connections were opened in a short\nperiod of time, all system memory and swap space would be consumed by\nhttpd, negatively impacting other processes, or causing a system\ncrash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux\n5 prior to 5.3. The problem was introduced via the RHBA-2009:0181\nerrata in Red Hat Enterprise Linux 5.3, which upgraded OpenSSL to the\nnewer 0.9.8e version.\n\nA flaw was found in the handling of the 'Options' and 'AllowOverride'\ndirectives. In configurations using the 'AllowOverride' directive with\ncertain 'Options=' arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which\ncontain backported patches to resolve these issues. Users must restart\nhttpd for this update to take effect.", "edition": 28, "published": "2010-01-06T00:00:00", "title": "CentOS 5 : httpd (CESA-2009:1075)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "modified": "2010-01-06T00:00:00", "cpe": ["p-cpe:/a:centos:centos:mod_ssl", "p-cpe:/a:centos:centos:httpd-manual", "p-cpe:/a:centos:centos:httpd", "p-cpe:/a:centos:centos:httpd-devel", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2009-1075.NASL", "href": "https://www.tenable.com/plugins/nessus/43753", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2009:1075 and \n# CentOS Errata and Security Advisory 2009:1075 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(43753);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2008-1678\", \"CVE-2009-1195\");\n script_bugtraq_id(31692);\n script_xref(name:\"RHSA\", value:\"2009:1075\");\n\n script_name(english:\"CentOS 5 : httpd (CESA-2009:1075)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated httpd packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between\nmod_ssl and OpenSSL. If too many connections were opened in a short\nperiod of time, all system memory and swap space would be consumed by\nhttpd, negatively impacting other processes, or causing a system\ncrash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux\n5 prior to 5.3. The problem was introduced via the RHBA-2009:0181\nerrata in Red Hat Enterprise Linux 5.3, which upgraded OpenSSL to the\nnewer 0.9.8e version.\n\nA flaw was found in the handling of the 'Options' and 'AllowOverride'\ndirectives. In configurations using the 'AllowOverride' directive with\ncertain 'Options=' arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which\ncontain backported patches to resolve these issues. Users must restart\nhttpd for this update to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-May/015953.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3db06974\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-May/015954.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0c3c575d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected httpd packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(16, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:httpd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:httpd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:httpd-manual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mod_ssl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/07/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/05/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/01/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"httpd-2.2.3-22.el5.centos.1\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"httpd-devel-2.2.3-22.el5.centos.1\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"httpd-manual-2.2.3-22.el5.centos.1\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"mod_ssl-2.2.3-22.el5.centos.1\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"httpd / httpd-devel / httpd-manual / mod_ssl\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T12:44:32", "description": "From Red Hat Security Advisory 2009:1075 :\n\nUpdated httpd packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between\nmod_ssl and OpenSSL. If too many connections were opened in a short\nperiod of time, all system memory and swap space would be consumed by\nhttpd, negatively impacting other processes, or causing a system\ncrash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux\n5 prior to 5.3. The problem was introduced via the RHBA-2009:0181\nerrata in Red Hat Enterprise Linux 5.3, which upgraded OpenSSL to the\nnewer 0.9.8e version.\n\nA flaw was found in the handling of the 'Options' and 'AllowOverride'\ndirectives. In configurations using the 'AllowOverride' directive with\ncertain 'Options=' arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which\ncontain backported patches to resolve these issues. Users must restart\nhttpd for this update to take effect.", "edition": 26, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 : httpd (ELSA-2009-1075)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:httpd-devel", "p-cpe:/a:oracle:linux:httpd", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:mod_ssl", "p-cpe:/a:oracle:linux:httpd-manual"], "id": "ORACLELINUX_ELSA-2009-1075.NASL", "href": "https://www.tenable.com/plugins/nessus/67866", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2009:1075 and \n# Oracle Linux Security Advisory ELSA-2009-1075 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67866);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-1678\", \"CVE-2009-1195\");\n script_bugtraq_id(31692);\n script_xref(name:\"RHSA\", value:\"2009:1075\");\n\n script_name(english:\"Oracle Linux 5 : httpd (ELSA-2009-1075)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2009:1075 :\n\nUpdated httpd packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between\nmod_ssl and OpenSSL. If too many connections were opened in a short\nperiod of time, all system memory and swap space would be consumed by\nhttpd, negatively impacting other processes, or causing a system\ncrash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux\n5 prior to 5.3. The problem was introduced via the RHBA-2009:0181\nerrata in Red Hat Enterprise Linux 5.3, which upgraded OpenSSL to the\nnewer 0.9.8e version.\n\nA flaw was found in the handling of the 'Options' and 'AllowOverride'\ndirectives. In configurations using the 'AllowOverride' directive with\ncertain 'Options=' arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which\ncontain backported patches to resolve these issues. Users must restart\nhttpd for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2009-May/001022.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected httpd packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(16, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:httpd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:httpd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:httpd-manual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mod_ssl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/07/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/05/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"httpd-2.2.3-22.0.1.el5_3.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"httpd-devel-2.2.3-22.0.1.el5_3.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"httpd-manual-2.2.3-22.0.1.el5_3.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"mod_ssl-2.2.3-22.0.1.el5_3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"httpd / httpd-devel / httpd-manual / mod_ssl\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T14:43:10", "description": "Missing sanity checks of FTP URLs allowed cross site scripting (XSS)\nattacks via the mod_proxy_ftp module (CVE-2008-2939).\n\nMissing precautions allowed cross site request forgery (CSRF) via the\nmod_proxy_balancer interface (CVE-2007-6420).\n\nA memory leak in the ssl module could crash apache (CVE-2008-1678)", "edition": 24, "published": "2008-11-05T00:00:00", "title": "openSUSE 10 Security Update : apache2 (apache2-5648)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2939", "CVE-2008-1678", "CVE-2007-6420"], "modified": "2008-11-05T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:apache2-example-pages", "cpe:/o:novell:opensuse:10.3", "p-cpe:/a:novell:opensuse:apache2-worker", "p-cpe:/a:novell:opensuse:apache2-utils", "p-cpe:/a:novell:opensuse:apache2-prefork", "p-cpe:/a:novell:opensuse:apache2", "p-cpe:/a:novell:opensuse:apache2-devel"], "id": "SUSE_APACHE2-5648.NASL", "href": "https://www.tenable.com/plugins/nessus/34699", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update apache2-5648.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(34699);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-6420\", \"CVE-2008-1678\", \"CVE-2008-2939\");\n\n script_name(english:\"openSUSE 10 Security Update : apache2 (apache2-5648)\");\n script_summary(english:\"Check for the apache2-5648 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Missing sanity checks of FTP URLs allowed cross site scripting (XSS)\nattacks via the mod_proxy_ftp module (CVE-2008-2939).\n\nMissing precautions allowed cross site request forgery (CSRF) via the\nmod_proxy_balancer interface (CVE-2007-6420).\n\nA memory leak in the ssl module could crash apache (CVE-2008-1678)\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected apache2 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(79, 352, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-example-pages\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-prefork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-worker\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/09/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/11/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.3\", reference:\"apache2-2.2.4-70.6\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"apache2-devel-2.2.4-70.6\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"apache2-example-pages-2.2.4-70.6\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"apache2-prefork-2.2.4-70.6\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"apache2-utils-2.2.4-70.6\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"apache2-worker-2.2.4-70.6\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"apache2 / apache2-devel / apache2-example-pages / apache2-prefork / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T14:03:00", "description": "Missing sanity checks of FTP URLs allowed cross site scripting (XSS)\nattacks via the mod_proxy_ftp module (CVE-2008-2939).\n\nMissing precautions allowed cross site request forgery (CSRF) via the\nmod_proxy_balancer interface (CVE-2007-6420).\n\nA memory leak in the ssl module could crash apache (CVE-2008-1678)", "edition": 24, "published": "2009-07-21T00:00:00", "title": "openSUSE Security Update : apache2 (apache2-222)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2939", "CVE-2008-1678", "CVE-2007-6420"], "modified": "2009-07-21T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:apache2-example-pages", "p-cpe:/a:novell:opensuse:apache2-worker", "cpe:/o:novell:opensuse:11.0", "p-cpe:/a:novell:opensuse:apache2-utils", "p-cpe:/a:novell:opensuse:apache2-prefork", "p-cpe:/a:novell:opensuse:apache2", "p-cpe:/a:novell:opensuse:apache2-devel"], "id": "SUSE_11_0_APACHE2-080925.NASL", "href": "https://www.tenable.com/plugins/nessus/39910", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update apache2-222.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(39910);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-6420\", \"CVE-2008-1678\", \"CVE-2008-2939\");\n\n script_name(english:\"openSUSE Security Update : apache2 (apache2-222)\");\n script_summary(english:\"Check for the apache2-222 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Missing sanity checks of FTP URLs allowed cross site scripting (XSS)\nattacks via the mod_proxy_ftp module (CVE-2008-2939).\n\nMissing precautions allowed cross site request forgery (CSRF) via the\nmod_proxy_balancer interface (CVE-2007-6420).\n\nA memory leak in the ssl module could crash apache (CVE-2008-1678)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=210904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=373903\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=392096\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=415061\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected apache2 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(79, 352, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-example-pages\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-prefork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-worker\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/09/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/07/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.0\", reference:\"apache2-2.2.8-28.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"apache2-devel-2.2.8-28.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"apache2-example-pages-2.2.8-28.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"apache2-prefork-2.2.8-28.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"apache2-utils-2.2.8-28.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"apache2-worker-2.2.8-28.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"apache2 / apache2-devel / apache2-example-pages / apache2-prefork / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T11:52:27", "description": "Multiple vulnerabilities has been found and corrected in apache :\n\nMemory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c\nin libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to\ncause a denial of service (memory consumption) via multiple calls, as\ndemonstrated by initial SSL client handshakes to the Apache HTTP\nServer mod_ssl that specify a compression algorithm (CVE-2008-1678).\nNote that this security issue does not really apply as zlib\ncompression is not enabled in the openssl build provided by Mandriva,\nbut apache is patched to address this issue anyway (conserns 2008.1\nonly).\n\nmod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server\n2.2.11 allows remote attackers to obtain sensitive response data,\nintended for a client that sent an earlier POST request with no\nrequest body, via an HTTP request (CVE-2009-1191).\n\nCross-site scripting (XSS) vulnerability in proxy_ftp.c in the\nmod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\nin the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\nallows remote attackers to inject arbitrary web script or HTML via\nwildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this\nsecurity issue was initially addressed with MDVSA-2008:195 but the\npatch fixing the issue was added but not applied in 2009.0.\n\nThe Apache HTTP Server 2.2.11 and earlier 2.2 versions does not\nproperly handle Options=IncludesNOEXEC in the AllowOverride directive,\nwhich allows local users to gain privileges by configuring (1) Options\nIncludes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a\n.htaccess file, and then inserting an exec element in a .shtml file\n(CVE-2009-1195).\n\nThe stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy\nmodule in the Apache HTTP Server before 2.3.3, when a reverse proxy is\nconfigured, does not properly handle an amount of streamed data that\nexceeds the Content-Length value, which allows remote attackers to\ncause a denial of service (CPU consumption) via crafted requests\n(CVE-2009-1890).\n\nFix a potential Denial-of-Service attack against mod_deflate or other\nmodules, by forcing the server to consume CPU time in compressing a\nlarge file after a client disconnects (CVE-2009-1891).\n\nThe ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the\nmod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13\nallows remote FTP servers to cause a denial of service (NULL pointer\ndereference and child process crash) via a malformed reply to an EPSV\ncommand (CVE-2009-3094).\n\nThe mod_proxy_ftp module in the Apache HTTP Server allows remote\nattackers to bypass intended access restrictions and send arbitrary\ncommands to an FTP server via vectors related to the embedding of\nthese commands in the Authorization HTTP header, as demonstrated by a\ncertain module in VulnDisco Pack Professional 8.11. NOTE: as of\n20090903, this disclosure has no actionable information. However,\nbecause the VulnDisco Pack author is a reliable researcher, the issue\nis being assigned a CVE identifier for tracking purposes\n(CVE-2009-3095).\n\nApache is affected by SSL injection or man-in-the-middle attacks due\nto a design flaw in the SSL and/or TLS protocols. A short term\nsolution was released Sat Nov 07 2009 by the ASF team to mitigate\nthese problems. Apache will now reject in-session renegotiation\n(CVE-2009-3555).\n\nPackages for 2008.0 are provided for Corporate Desktop 2008.0\ncustomers\n\nThis update provides a solution to these vulnerabilities.", "edition": 28, "published": "2009-12-08T00:00:00", "title": "Mandriva Linux Security Advisory : apache (MDVSA-2009:323)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1191", "CVE-2008-2939", "CVE-2009-3094", "CVE-2008-1678", "CVE-2009-3555", "CVE-2009-1890", "CVE-2009-3095", "CVE-2009-1891", "CVE-2009-1195"], "modified": "2009-12-08T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:apache-mpm-worker", "p-cpe:/a:mandriva:linux:apache-mod_ssl", "p-cpe:/a:mandriva:linux:apache-mod_ldap", "p-cpe:/a:mandriva:linux:apache-mpm-event", "p-cpe:/a:mandriva:linux:apache-modules", "p-cpe:/a:mandriva:linux:apache-htcacheclean", "p-cpe:/a:mandriva:linux:apache-devel", "p-cpe:/a:mandriva:linux:apache-mod_dav", "p-cpe:/a:mandriva:linux:apache-mod_dbd", "p-cpe:/a:mandriva:linux:apache-mod_mem_cache", "p-cpe:/a:mandriva:linux:apache-mod_proxy", "cpe:/o:mandriva:linux:2008.0", "p-cpe:/a:mandriva:linux:apache-mod_file_cache", "p-cpe:/a:mandriva:linux:apache-mod_authn_dbd", "p-cpe:/a:mandriva:linux:apache-source", "p-cpe:/a:mandriva:linux:apache-base", "p-cpe:/a:mandriva:linux:apache-mod_deflate", "p-cpe:/a:mandriva:linux:apache-mod_proxy_ajp", "p-cpe:/a:mandriva:linux:apache-mod_disk_cache", "p-cpe:/a:mandriva:linux:apache-mpm-itk", "p-cpe:/a:mandriva:linux:apache-mpm-prefork", "p-cpe:/a:mandriva:linux:apache-mod_cache", "p-cpe:/a:mandriva:linux:apache-mod_userdir"], "id": "MANDRIVA_MDVSA-2009-323.NASL", "href": "https://www.tenable.com/plugins/nessus/43042", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2009:323. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(43042);\n script_version(\"1.28\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2008-1678\", \"CVE-2008-2939\", \"CVE-2009-1191\", \"CVE-2009-1195\", \"CVE-2009-1890\", \"CVE-2009-1891\", \"CVE-2009-3094\", \"CVE-2009-3095\", \"CVE-2009-3555\");\n script_bugtraq_id(30560, 31692, 34663, 35115, 35565, 35623, 36254, 36260, 36935);\n script_xref(name:\"MDVSA\", value:\"2009:323\");\n\n script_name(english:\"Mandriva Linux Security Advisory : apache (MDVSA-2009:323)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities has been found and corrected in apache :\n\nMemory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c\nin libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to\ncause a denial of service (memory consumption) via multiple calls, as\ndemonstrated by initial SSL client handshakes to the Apache HTTP\nServer mod_ssl that specify a compression algorithm (CVE-2008-1678).\nNote that this security issue does not really apply as zlib\ncompression is not enabled in the openssl build provided by Mandriva,\nbut apache is patched to address this issue anyway (conserns 2008.1\nonly).\n\nmod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server\n2.2.11 allows remote attackers to obtain sensitive response data,\nintended for a client that sent an earlier POST request with no\nrequest body, via an HTTP request (CVE-2009-1191).\n\nCross-site scripting (XSS) vulnerability in proxy_ftp.c in the\nmod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\nin the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\nallows remote attackers to inject arbitrary web script or HTML via\nwildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this\nsecurity issue was initially addressed with MDVSA-2008:195 but the\npatch fixing the issue was added but not applied in 2009.0.\n\nThe Apache HTTP Server 2.2.11 and earlier 2.2 versions does not\nproperly handle Options=IncludesNOEXEC in the AllowOverride directive,\nwhich allows local users to gain privileges by configuring (1) Options\nIncludes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a\n.htaccess file, and then inserting an exec element in a .shtml file\n(CVE-2009-1195).\n\nThe stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy\nmodule in the Apache HTTP Server before 2.3.3, when a reverse proxy is\nconfigured, does not properly handle an amount of streamed data that\nexceeds the Content-Length value, which allows remote attackers to\ncause a denial of service (CPU consumption) via crafted requests\n(CVE-2009-1890).\n\nFix a potential Denial-of-Service attack against mod_deflate or other\nmodules, by forcing the server to consume CPU time in compressing a\nlarge file after a client disconnects (CVE-2009-1891).\n\nThe ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the\nmod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13\nallows remote FTP servers to cause a denial of service (NULL pointer\ndereference and child process crash) via a malformed reply to an EPSV\ncommand (CVE-2009-3094).\n\nThe mod_proxy_ftp module in the Apache HTTP Server allows remote\nattackers to bypass intended access restrictions and send arbitrary\ncommands to an FTP server via vectors related to the embedding of\nthese commands in the Authorization HTTP header, as demonstrated by a\ncertain module in VulnDisco Pack Professional 8.11. NOTE: as of\n20090903, this disclosure has no actionable information. However,\nbecause the VulnDisco Pack author is a reliable researcher, the issue\nis being assigned a CVE identifier for tracking purposes\n(CVE-2009-3095).\n\nApache is affected by SSL injection or man-in-the-middle attacks due\nto a design flaw in the SSL and/or TLS protocols. A short term\nsolution was released Sat Nov 07 2009 by the ASF team to mitigate\nthese problems. Apache will now reject in-session renegotiation\n(CVE-2009-3555).\n\nPackages for 2008.0 are provided for Corporate Desktop 2008.0\ncustomers\n\nThis update provides a solution to these vulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(16, 20, 79, 119, 189, 264, 310, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-htcacheclean\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_authn_dbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_cache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_dav\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_dbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_deflate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_disk_cache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_file_cache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_mem_cache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_proxy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_proxy_ajp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_ssl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_userdir\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mpm-event\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mpm-itk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mpm-prefork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mpm-worker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-source\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/12/08\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-base-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-devel-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-htcacheclean-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_authn_dbd-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_cache-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_dav-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_dbd-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_deflate-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_disk_cache-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_file_cache-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_ldap-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_mem_cache-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_proxy-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_proxy_ajp-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_ssl-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mod_userdir-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-modules-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mpm-event-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mpm-itk-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mpm-prefork-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-mpm-worker-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"apache-source-2.2.6-8.3mdv2008.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T15:44:27", "description": "It was discovered that Apache did not sanitize the method specifier\nheader from an HTTP request when it is returned in an error message,\nwhich could result in browsers becoming vulnerable to cross-site\nscripting attacks when processing the output. With cross-site\nscripting vulnerabilities, if a user were tricked into viewing server\noutput during a crafted server request, a remote attacker could\nexploit this to modify the contents, or steal confidential data (such\nas passwords), within the same domain. This issue only affected Ubuntu\n6.06 LTS and 7.10. (CVE-2007-6203)\n\nIt was discovered that Apache was vulnerable to a cross-site request\nforgery (CSRF) in the mod_proxy_balancer balancer manager. If an\nApache administrator were tricked into clicking a link on a specially\ncrafted web page, an attacker could trigger commands that could modify\nthe balancer manager configuration. This issue only affected Ubuntu\n7.10 and 8.04 LTS. (CVE-2007-6420)\n\nIt was discovered that Apache had a memory leak when using mod_ssl\nwith compression. A remote attacker could exploit this to exhaust\nserver memory, leading to a denial of service. This issue only\naffected Ubuntu 7.10. (CVE-2008-1678)\n\nIt was discovered that in certain conditions, Apache did not specify a\ndefault character set when returning certain error messages containing\nUTF-7 encoded data, which could result in browsers becoming vulnerable\nto cross-site scripting attacks when processing the output. This issue\nonly affected Ubuntu 6.06 LTS and 7.10. (CVE-2008-2168)\n\nIt was discovered that when configured as a proxy server, Apache did\nnot limit the number of forwarded interim responses. A malicious\nremote server could send a large number of interim responses and cause\na denial of service via memory exhaustion. (CVE-2008-2364)\n\nIt was discovered that mod_proxy_ftp did not sanitize wildcard\npathnames when they are returned in directory listings, which could\nresult in browsers becoming vulnerable to cross-site scripting attacks\nwhen processing the output. (CVE-2008-2939).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 27, "published": "2009-04-23T00:00:00", "title": "Ubuntu 6.06 LTS / 7.10 / 8.04 LTS : apache2 vulnerabilities (USN-731-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2939", "CVE-2008-2364", "CVE-2007-6203", "CVE-2008-1678", "CVE-2008-2168", "CVE-2007-6420"], "modified": "2009-04-23T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:apache2-src", "p-cpe:/a:canonical:ubuntu_linux:apache2-prefork-dev", "cpe:/o:canonical:ubuntu_linux:7.10", "p-cpe:/a:canonical:ubuntu_linux:apache2-mpm-event", "p-cpe:/a:canonical:ubuntu_linux:apache2-mpm-perchild", "p-cpe:/a:canonical:ubuntu_linux:libapr0", "p-cpe:/a:canonical:ubuntu_linux:apache2-mpm-prefork", "p-cpe:/a:canonical:ubuntu_linux:libapr0-dev", "p-cpe:/a:canonical:ubuntu_linux:apache2", "cpe:/o:canonical:ubuntu_linux:8.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:apache2.2-common", "p-cpe:/a:canonical:ubuntu_linux:apache2-mpm-worker", "p-cpe:/a:canonical:ubuntu_linux:apache2-threaded-dev", "p-cpe:/a:canonical:ubuntu_linux:apache2-doc", "p-cpe:/a:canonical:ubuntu_linux:apache2-common", "p-cpe:/a:canonical:ubuntu_linux:apache2-utils", "cpe:/o:canonical:ubuntu_linux:6.06:-:lts"], "id": "UBUNTU_USN-731-1.NASL", "href": "https://www.tenable.com/plugins/nessus/36589", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-731-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(36589);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2007-6203\", \"CVE-2007-6420\", \"CVE-2008-1678\", \"CVE-2008-2168\", \"CVE-2008-2364\", \"CVE-2008-2939\");\n script_bugtraq_id(26663, 27236, 29653, 30560, 31692);\n script_xref(name:\"USN\", value:\"731-1\");\n\n script_name(english:\"Ubuntu 6.06 LTS / 7.10 / 8.04 LTS : apache2 vulnerabilities (USN-731-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that Apache did not sanitize the method specifier\nheader from an HTTP request when it is returned in an error message,\nwhich could result in browsers becoming vulnerable to cross-site\nscripting attacks when processing the output. With cross-site\nscripting vulnerabilities, if a user were tricked into viewing server\noutput during a crafted server request, a remote attacker could\nexploit this to modify the contents, or steal confidential data (such\nas passwords), within the same domain. This issue only affected Ubuntu\n6.06 LTS and 7.10. (CVE-2007-6203)\n\nIt was discovered that Apache was vulnerable to a cross-site request\nforgery (CSRF) in the mod_proxy_balancer balancer manager. If an\nApache administrator were tricked into clicking a link on a specially\ncrafted web page, an attacker could trigger commands that could modify\nthe balancer manager configuration. This issue only affected Ubuntu\n7.10 and 8.04 LTS. (CVE-2007-6420)\n\nIt was discovered that Apache had a memory leak when using mod_ssl\nwith compression. A remote attacker could exploit this to exhaust\nserver memory, leading to a denial of service. This issue only\naffected Ubuntu 7.10. (CVE-2008-1678)\n\nIt was discovered that in certain conditions, Apache did not specify a\ndefault character set when returning certain error messages containing\nUTF-7 encoded data, which could result in browsers becoming vulnerable\nto cross-site scripting attacks when processing the output. This issue\nonly affected Ubuntu 6.06 LTS and 7.10. (CVE-2008-2168)\n\nIt was discovered that when configured as a proxy server, Apache did\nnot limit the number of forwarded interim responses. A malicious\nremote server could send a large number of interim responses and cause\na denial of service via memory exhaustion. (CVE-2008-2364)\n\nIt was discovered that mod_proxy_ftp did not sanitize wildcard\npathnames when they are returned in directory listings, which could\nresult in browsers becoming vulnerable to cross-site scripting attacks\nwhen processing the output. (CVE-2008-2939).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/731-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(79, 352, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2-mpm-event\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2-mpm-perchild\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2-mpm-prefork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2-mpm-worker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2-prefork-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2-src\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2-threaded-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apache2.2-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libapr0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libapr0-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(6\\.06|7\\.10|8\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06 / 7.10 / 8.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"apache2\", pkgver:\"2.0.55-4ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"apache2-common\", pkgver:\"2.0.55-4ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"apache2-doc\", pkgver:\"2.0.55-4ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"apache2-mpm-perchild\", pkgver:\"2.0.55-4ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"apache2-mpm-prefork\", pkgver:\"2.0.55-4ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"apache2-mpm-worker\", pkgver:\"2.0.55-4ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"apache2-prefork-dev\", pkgver:\"2.0.55-4ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"apache2-threaded-dev\", pkgver:\"2.0.55-4ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"apache2-utils\", pkgver:\"2.0.55-4ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libapr0\", pkgver:\"2.0.55-4ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libapr0-dev\", pkgver:\"2.0.55-4ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"apache2\", pkgver:\"2.2.4-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"apache2-doc\", pkgver:\"2.2.4-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"apache2-mpm-event\", pkgver:\"2.2.4-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"apache2-mpm-perchild\", pkgver:\"2.2.4-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"apache2-mpm-prefork\", pkgver:\"2.2.4-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"apache2-mpm-worker\", pkgver:\"2.2.4-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"apache2-prefork-dev\", pkgver:\"2.2.4-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"apache2-src\", pkgver:\"2.2.4-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"apache2-threaded-dev\", pkgver:\"2.2.4-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"apache2-utils\", pkgver:\"2.2.4-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"apache2.2-common\", pkgver:\"2.2.4-3ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"apache2\", pkgver:\"2.2.8-1ubuntu0.4\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"apache2-doc\", pkgver:\"2.2.8-1ubuntu0.4\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"apache2-mpm-event\", pkgver:\"2.2.8-1ubuntu0.5\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"apache2-mpm-perchild\", pkgver:\"2.2.8-1ubuntu0.5\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"apache2-mpm-prefork\", pkgver:\"2.2.8-1ubuntu0.5\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"apache2-mpm-worker\", pkgver:\"2.2.8-1ubuntu0.5\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"apache2-prefork-dev\", pkgver:\"2.2.8-1ubuntu0.4\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"apache2-src\", pkgver:\"2.2.8-1ubuntu0.4\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"apache2-threaded-dev\", pkgver:\"2.2.8-1ubuntu0.4\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"apache2-utils\", pkgver:\"2.2.8-1ubuntu0.4\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"apache2.2-common\", pkgver:\"2.2.8-1ubuntu0.5\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"apache2 / apache2-common / apache2-doc / apache2-mpm-event / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T10:51:23", "description": "CVE Mitre reports :\n\nCross-site scripting (XSS) vulnerability in proxy_ftp.c in the\nmod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\nin the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\nallows remote attackers to inject arbitrary web script or HTML via a\nwildcard in the last directory component in the pathname in an FTP\nURI.", "edition": 25, "published": "2009-03-12T00:00:00", "title": "FreeBSD : apache -- XSS vulnerability (f1892066-0e74-11de-92de-000bcdc1757a)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2939"], "modified": "2009-03-12T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:apache"], "id": "FREEBSD_PKG_F18920660E7411DE92DE000BCDC1757A.NASL", "href": "https://www.tenable.com/plugins/nessus/35911", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(35911);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2008-2939\");\n\n script_name(english:\"FreeBSD : apache -- XSS vulnerability (f1892066-0e74-11de-92de-000bcdc1757a)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"CVE Mitre reports :\n\nCross-site scripting (XSS) vulnerability in proxy_ftp.c in the\nmod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\nin the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\nallows remote attackers to inject arbitrary web script or HTML via a\nwildcard in the last directory component in the pathname in an FTP\nURI.\"\n );\n # http://www.rapid7.com/advisories/R7-0033.jsp\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://help.rapid7.com/?community#/?tags=disclosure\"\n );\n # https://vuxml.freebsd.org/freebsd/f1892066-0e74-11de-92de-000bcdc1757a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?42a041e3\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cwe_id(79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:apache\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/07/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/03/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"apache>2.2.0<2.2.9_2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"apache>2.0.0<2.0.63_2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "redhat": [{"lastseen": "2019-08-13T18:45:06", "bulletinFamily": "unix", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "description": "The Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between mod_ssl\nand OpenSSL. If too many connections were opened in a short period of time,\nall system memory and swap space would be consumed by httpd, negatively\nimpacting other processes, or causing a system crash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux 5\nprior to 5.3. The problem was introduced via the RHBA-2009:0181 errata in\nRed Hat Enterprise Linux 5.3, which upgraded OpenSSL to the newer 0.9.8e\nversion.\n\nA flaw was found in the handling of the \"Options\" and \"AllowOverride\"\ndirectives. In configurations using the \"AllowOverride\" directive with\ncertain \"Options=\" arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Users must restart httpd for\nthis update to take effect.", "modified": "2017-09-08T12:15:32", "published": "2009-05-27T04:00:00", "id": "RHSA-2009:1075", "href": "https://access.redhat.com/errata/RHSA-2009:1075", "type": "redhat", "title": "(RHSA-2009:1075) Moderate: httpd security update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-08-13T18:46:51", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2364", "CVE-2008-2939"], "description": "The Apache HTTP Server is a popular Web server.\n\nA flaw was found in the mod_proxy Apache module. An attacker in control of\na Web server to which requests were being proxied could have caused a\nlimited denial of service due to CPU consumption and stack exhaustion.\n(CVE-2008-2364)\n\nA flaw was found in the mod_proxy_ftp Apache module. If Apache was\nconfigured to support FTP-over-HTTP proxying, a remote attacker could have\nperformed a cross-site scripting attack. (CVE-2008-2939)\n\nIn addition, these updated packages fix a bug found in the handling of the\n\"ProxyRemoteMatch\" directive in the Red Hat Enterprise Linux 4 httpd\npackages. This bug is not present in the Red Hat Enterprise Linux 3 or Red\nHat Enterprise Linux 5 packages.\n\nUsers of httpd should upgrade to these updated packages, which contain\nbackported patches to correct these issues.\n", "modified": "2017-09-08T11:53:55", "published": "2008-11-11T05:00:00", "id": "RHSA-2008:0967", "href": "https://access.redhat.com/errata/RHSA-2008:0967", "type": "redhat", "title": "(RHSA-2008:0967) Moderate: httpd security and bug fix update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-08-13T18:45:58", "bulletinFamily": "unix", "cvelist": ["CVE-2007-6420", "CVE-2008-2364", "CVE-2008-2939"], "description": "The Red Hat Application Stack v2.2 is an integrated open source application\nstack, that includes Red Hat Enterprise Linux 5 and JBoss Enterprise\nApplication Platform (EAP) 4.2.\n\nThis erratum updates the Apache HTTP Server package to version 2.2.10 which\naddresses the following security issues:\n\nA flaw was found in the mod_proxy module. An attacker who has control of\na web server to which requests are being proxied could cause a limited\ndenial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)\n\nA flaw was found in the mod_proxy_ftp module. Where Apache is configured\nto support ftp-over-httpd proxying, a remote attacker could perform a\ncross-site scripting attack. (CVE-2008-2939)\n\nA cross-site request forgery issue was found in the mod_proxy_balancer\nmodule. A remote attacker could cause a denial of service if\nmod_proxy_balancer is enabled and an authenticated user is targeted. \n(CVE-2007-6420)\n\nThe JBoss Enterprise Application Platform (EAP) 4.2 has been updated to\nversion 4.2.0.CP05. \n\nThe following packages were also updated:\n\n* mysql to 5.0.60sp1\n* mysql-connector-odbc to 3.51.26r1127\n* perl-DBI to 1.607\n* perl-DBD-MySQL to 4.008\n* perl-DBD-Pg to 1.49\n* php-pear to 1.7.2\n* postgresql to 8.2.11\n* postgresqlclient81 to 8.1.11", "modified": "2019-03-22T23:44:29", "published": "2008-12-04T05:00:00", "id": "RHSA-2008:0966", "href": "https://access.redhat.com/errata/RHSA-2008:0966", "type": "redhat", "title": "(RHSA-2008:0966) Moderate: Red Hat Application Stack v2.2 security and enhancement update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-08-13T18:45:58", "bulletinFamily": "unix", "cvelist": ["CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1891"], "description": "The Apache HTTP Server is a popular Web server.\n\nA denial of service flaw was found in the Apache mod_proxy module when it\nwas used as a reverse proxy. A remote attacker could use this flaw to force\na proxy process to consume large amounts of CPU time. (CVE-2009-1890)\n\nA denial of service flaw was found in the Apache mod_deflate module. This\nmodule continued to compress large files until compression was complete,\neven if the network connection that requested the content was closed before\ncompression completed. This would cause mod_deflate to consume large\namounts of CPU if mod_deflate was enabled for a large file. (CVE-2009-1891)\n\nA flaw was found in the handling of the \"Options\" and \"AllowOverride\"\ndirectives used by the Apache HTTP Server. In configurations using the\n\"AllowOverride\" directive with certain \"Options=\" arguments, local users\nwere not restricted from executing commands from a Server-Side-Include\nscript as intended. (CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect.", "modified": "2019-03-22T23:44:11", "published": "2009-07-14T04:00:00", "id": "RHSA-2009:1156", "href": "https://access.redhat.com/errata/RHSA-2009:1156", "type": "redhat", "title": "(RHSA-2009:1156) Important: httpd security update", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:47:10", "bulletinFamily": "unix", "cvelist": ["CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1891"], "description": "The Apache HTTP Server is a popular Web server.\n\nA denial of service flaw was found in the Apache mod_proxy module when it\nwas used as a reverse proxy. A remote attacker could use this flaw to force\na proxy process to consume large amounts of CPU time. (CVE-2009-1890)\n\nA flaw was found in the handling of the \"Options\" and \"AllowOverride\"\ndirectives used by the Apache HTTP Server. In configurations using the\n\"AllowOverride\" directive with certain \"Options=\" arguments, local users\nwere not restricted from executing commands from a Server-Side-Include\nscript as intended. (CVE-2009-1195)\n\nA denial of service flaw was found in the Apache mod_deflate module. This\nmodule continued to compress large files until compression was complete,\neven if the network connection that requested the content was closed before\ncompression completed. This would cause mod_deflate to consume large\namounts of CPU if mod_deflate was enabled for a large file. (CVE-2009-1891)\n\nAll users of JBoss Enterprise Web Server 1.0.0 should upgrade to these\nupdated packages, which contain backported patches to correct these issues.\nAfter installing the updated packages, the httpd daemon must be restarted\nfor the update to take effect.", "modified": "2016-04-04T18:31:38", "published": "2009-07-14T04:00:00", "id": "RHSA-2009:1155", "href": "https://access.redhat.com/errata/RHSA-2009:1155", "type": "redhat", "title": "(RHSA-2009:1155) Important: httpd security update", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:27:18", "bulletinFamily": "unix", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "description": "**CentOS Errata and Security Advisory** CESA-2009:1075\n\n\nThe Apache HTTP Server is a popular and freely-available Web server.\n\nA flaw was found in the handling of compression structures between mod_ssl\nand OpenSSL. If too many connections were opened in a short period of time,\nall system memory and swap space would be consumed by httpd, negatively\nimpacting other processes, or causing a system crash. (CVE-2008-1678)\n\nNote: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux 5\nprior to 5.3. The problem was introduced via the RHBA-2009:0181 errata in\nRed Hat Enterprise Linux 5.3, which upgraded OpenSSL to the newer 0.9.8e\nversion.\n\nA flaw was found in the handling of the \"Options\" and \"AllowOverride\"\ndirectives. In configurations using the \"AllowOverride\" directive with\ncertain \"Options=\" arguments, local users were not restricted from\nexecuting commands from a Server-Side-Include script as intended.\n(CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Users must restart httpd for\nthis update to take effect.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-May/027991.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-May/027992.html\n\n**Affected packages:**\nhttpd\nhttpd-devel\nhttpd-manual\nmod_ssl\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2009-1075.html", "edition": 3, "modified": "2009-05-28T17:08:08", "published": "2009-05-28T17:08:08", "href": "http://lists.centos.org/pipermail/centos-announce/2009-May/027991.html", "id": "CESA-2009:1075", "title": "httpd, mod_ssl security update", "type": "centos", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-08T03:33:12", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2939", "CVE-2008-2364"], "description": "**CentOS Errata and Security Advisory** CESA-2008:0967\n\n\nThe Apache HTTP Server is a popular Web server.\n\nA flaw was found in the mod_proxy Apache module. An attacker in control of\na Web server to which requests were being proxied could have caused a\nlimited denial of service due to CPU consumption and stack exhaustion.\n(CVE-2008-2364)\n\nA flaw was found in the mod_proxy_ftp Apache module. If Apache was\nconfigured to support FTP-over-HTTP proxying, a remote attacker could have\nperformed a cross-site scripting attack. (CVE-2008-2939)\n\nIn addition, these updated packages fix a bug found in the handling of the\n\"ProxyRemoteMatch\" directive in the Red Hat Enterprise Linux 4 httpd\npackages. This bug is not present in the Red Hat Enterprise Linux 3 or Red\nHat Enterprise Linux 5 packages.\n\nUsers of httpd should upgrade to these updated packages, which contain\nbackported patches to correct these issues.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/027427.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/027428.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/027431.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/027432.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/027442.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/027443.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/027448.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/027449.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/027456.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/027458.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/039766.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/039767.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/039770.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-November/039771.html\n\n**Affected packages:**\nhttpd\nhttpd-devel\nhttpd-manual\nhttpd-suexec\nmod_ssl\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0967.html", "edition": 5, "modified": "2008-11-18T19:49:31", "published": "2008-11-11T20:45:50", "href": "http://lists.centos.org/pipermail/centos-announce/2008-November/027427.html", "id": "CESA-2008:0967", "title": "httpd, mod_ssl security update", "type": "centos", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:37:28", "bulletinFamily": "unix", "cvelist": ["CVE-2008-1678", "CVE-2009-1195"], "description": "[2.2.3-22.0.1.el5_3.1]\n- Replace index.html with oracle's index page oracle_index.html\n- Update vstring and distro in specfile\n[2.2.3-22.el5_3.1]\n- add security fixes for CVE-2008-1678, CVE-2009-1195 (#499284) ", "edition": 4, "modified": "2009-05-27T00:00:00", "published": "2009-05-27T00:00:00", "id": "ELSA-2009-1075", "href": "http://linux.oracle.com/errata/ELSA-2009-1075.html", "title": "httpd security update", "type": "oraclelinux", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:35:00", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2939", "CVE-2008-2364"], "description": "[2.2.3-11.0.1.el5_2.4]\n- use oracle index page oracle_index.html\n- update vstring and distro in specfile\n[2.2.3-11.el5_2.4]\n- add security fixes for CVE-2008-2364, CVE-2008-2939 (#468840)", "edition": 4, "modified": "2008-11-11T00:00:00", "published": "2008-11-11T00:00:00", "id": "ELSA-2008-0967", "href": "http://linux.oracle.com/errata/ELSA-2008-0967.html", "title": "httpd security and bug fix update", "type": "oraclelinux", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "ubuntu": [{"lastseen": "2020-07-08T23:42:34", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2939", "CVE-2008-2364", "CVE-2007-6203", "CVE-2008-1678", "CVE-2008-2168", "CVE-2007-6420"], "description": "It was discovered that Apache did not sanitize the method specifier header from \nan HTTP request when it is returned in an error message, which could result in \nbrowsers becoming vulnerable to cross-site scripting attacks when processing the \noutput. With cross-site scripting vulnerabilities, if a user were tricked into \nviewing server output during a crafted server request, a remote attacker could \nexploit this to modify the contents, or steal confidential data (such as \npasswords), within the same domain. This issue only affected Ubuntu 6.06 LTS and \n7.10. (CVE-2007-6203)\n\nIt was discovered that Apache was vulnerable to a cross-site request forgery \n(CSRF) in the mod_proxy_balancer balancer manager. If an Apache administrator \nwere tricked into clicking a link on a specially crafted web page, an attacker \ncould trigger commands that could modify the balancer manager configuration. \nThis issue only affected Ubuntu 7.10 and 8.04 LTS. (CVE-2007-6420)\n\nIt was discovered that Apache had a memory leak when using mod_ssl with \ncompression. A remote attacker could exploit this to exhaust server memory, \nleading to a denial of service. This issue only affected Ubuntu 7.10. \n(CVE-2008-1678)\n\nIt was discovered that in certain conditions, Apache did not specify a default \ncharacter set when returning certain error messages containing UTF-7 encoded \ndata, which could result in browsers becoming vulnerable to cross-site scripting \nattacks when processing the output. This issue only affected Ubuntu 6.06 LTS and \n7.10. (CVE-2008-2168)\n\nIt was discovered that when configured as a proxy server, Apache did not limit \nthe number of forwarded interim responses. A malicious remote server could send \na large number of interim responses and cause a denial of service via memory \nexhaustion. (CVE-2008-2364)\n\nIt was discovered that mod_proxy_ftp did not sanitize wildcard pathnames when \nthey are returned in directory listings, which could result in browsers becoming \nvulnerable to cross-site scripting attacks when processing the output. \n(CVE-2008-2939)", "edition": 5, "modified": "2009-03-10T00:00:00", "published": "2009-03-10T00:00:00", "id": "USN-731-1", "href": "https://ubuntu.com/security/notices/USN-731-1", "title": "Apache vulnerabilities", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "seebug": [{"lastseen": "2017-11-19T21:32:51", "description": "BUGTRAQ ID: 30560\r\nCVE(CAN) ID: CVE-2008-2939\r\n\r\nApache HTTP Server\u662f\u4e00\u6b3e\u6d41\u884c\u7684Web\u670d\u52a1\u5668\u3002\r\n\r\n\u5982\u679c\u5c06Apache HTTP Server\u914d\u7f6e\u4e86\u4ee3\u7406\u652f\u6301\uff08\u914d\u7f6e\u6587\u4ef6\u4e2dProxyRequests On\uff09\u4e14\u542f\u7528\u4e86mod_proxy_ftp\u6a21\u5757\u4ee5\u63d0\u4f9bHTTP\u4e0aFTP\u652f\u6301\u7684\u8bdd\uff0c\u5219\u7c7b\u4f3c\u4e8e\u4ee5\u4e0b\u7684\u5305\u542b\u6709\u901a\u914d\u7b26\u5b57\u7b26\uff08\u201c*\u201d\u3001\u201c'\u201d\u3001\u201c[\u201d\u7b49\uff09\u7684\u8bf7\u6c42\uff1a\r\n\r\n GET ftp://host/*<foo> HTTP/1.0\r\n\r\n\u5c31\u4f1a\u5728mod_proxy_ftp\u6240\u8fd4\u56de\u7684\u54cd\u5e94\u4e2d\u5bfc\u81f4\u8de8\u7ad9\u811a\u672c\u653b\u51fb\uff1a\r\n\r\n [...]\r\n <h2>Directory of <a href="/">ftp://host</a>/*<foo></h2>\r\n [...]\r\n\r\n\u5982\u679c\u8981\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\uff0chost\u5fc5\u987b\u8fd0\u884c\u5728FTP\u670d\u52a1\u5668\u4e0a\uff0c\u8def\u5f84\u6700\u540e\u4e00\u4e2a\u76ee\u5f55\u7ec4\u4ef6\uff08XSS\u8d1f\u8f7d\uff09\u5fc5\u987b\u5305\u542b\u6709\u81f3\u5c11\u4e00\u4e2a\u901a\u914d\u7b26\u5b57\uff0c\u4e14\u4e0d\u80fd\u5305\u542b\u6709\u659c\u7ebf\u3002\r\n\n\nApache Group Apache 2.2.9 \r\nApache Group Apache 2.0.63\n Apache Group\r\n------------\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n<a href=http://svn.apache.org/viewvc?view=rev&revision=682868 target=_blank>http://svn.apache.org/viewvc?view=rev&revision=682868</a>", "published": "2008-08-08T00:00:00", "title": "Apache mod_proxy_ftp\u6a21\u5757\u901a\u914d\u7b26\u5b57\u7b26\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-2939"], "modified": "2008-08-08T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3804", "id": "SSV:3804", "sourceData": "\n ftp://host/*<img%20src=""%20onerror="alert(42)">\n ", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-3804"}, {"lastseen": "2017-11-19T18:58:56", "description": "BUGTRAQ ID:\r\nCVE ID\uff1aCVE-2008-2939\r\nCNCVE ID\uff1aCNCVE-20082939\r\n\r\nIBM HTTP Server\u662f\u4e00\u6b3eHTTP\u670d\u52a1\u7a0b\u5e8f\u3002\r\nIBM HTTP Server "mod_proxy_ftp"\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u95ee\u9898\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u8fdb\u884c\u8de8\u7ad9\u811a\u672c\u653b\u51fb\uff0c\u83b7\u5f97\u654f\u611f\u4fe1\u606f\u3002\r\n\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u89e3\u51b3\u65b9\u6848\u63d0\u4f9b\u3002\r\n\r\nIBM HTTP Server 6.0.x\r\n \u5382\u5546\u89e3\u51b3\u65b9\u6848\r\n\u53ef\u53c2\u8003\u5982\u4e0b\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\n<a href=http://www-01.ibm.com/support/docview.wss?uid=swg27007033 target=_blank rel=external nofollow>http://www-01.ibm.com/support/docview.wss?uid=swg27007033</a>", "published": "2009-02-16T00:00:00", "type": "seebug", "title": "IBM HTTP Server mod_proxy_ftp \u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-2939"], "modified": "2009-02-16T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4786", "id": "SSV:4786", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-11-19T18:46:27", "description": "BUGTRAQ ID: 35115\r\nCVE(CAN) ID: CVE-2009-1195\r\n\r\nApache HTTP Server\u662f\u4e00\u6b3e\u6d41\u884c\u7684Web\u670d\u52a1\u5668\u3002\r\n\r\nApache HTTP Server\u6ca1\u6709\u6b63\u786e\u5730\u5904\u7406AllowOverride\u6307\u4ee4\u4e2d\u7684Options=IncludesNOEXEC\u9009\u9879\uff0c\u672c\u5730\u7528\u6237\u53ef\u4ee5\u901a\u8fc7\u5728.htaccess\u6587\u4ef6\u4e2d\u914d\u7f6e(1) Options Includes\u3001(2) Options +Includes\u6216(3) Options +IncludesNOEXEC\u5e76\u5728.shtml\u6587\u4ef6\u4e2d\u6ce8\u5165exec\u5143\u7d20\u5bfc\u81f4\u7ed5\u8fc7\u5b89\u5168\u9650\u5236\u83b7\u5f97\u6743\u9650\u3002\n\nApache 2.2.x\n \u5382\u5546\u8865\u4e01\uff1a\r\n\r\nApache Group\r\n------------\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n<a href=\"http://svn.apache.org/viewvc?view=rev&revision=652885\" target=\"_blank\" rel=external nofollow>http://svn.apache.org/viewvc?view=rev&revision=652885</a>\r\n\r\nRedHat\r\n------\r\nRedHat\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08RHSA-2009:1075-01\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nRHSA-2009:1075-01\uff1aModerate: httpd security update\r\n\u94fe\u63a5\uff1a<a href=\"https://www.redhat.com/support/errata/RHSA-2009-1075.html\" target=\"_blank\" rel=external nofollow>https://www.redhat.com/support/errata/RHSA-2009-1075.html</a>", "published": "2009-06-22T00:00:00", "type": "seebug", "title": "Apache HTTP Server AllowOverride\u9009\u9879\u7ed5\u8fc7\u5b89\u5168\u9650\u5236\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2009-1195"], "modified": "2009-06-22T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-11668", "id": "SSV:11668", "sourceData": "\n \u5411httpd.conf\u4e2d\u6dfb\u52a0\uff1a\r\n\r\n<Directory "/var/www/html/test">\r\nOptions None\r\nAllowOverride Options=IncludesNoEXEC\r\n</Directory\r\n\r\n\u5728/var/www/html/test\u4e2d\u521b\u5efa\u4ee5\u4e0b\u4e24\u4e2a\u6587\u4ef6\uff1a\r\n\r\nindex.shtml:\r\n<html>\r\n<body>\r\n<p>\r\nThis document last modified <!--#flastmod file="front.shtml" -->\r\n</p>\r\n<p>Start include:</p>\r\n<!--#include virtual="/test/test.shtml" -->\r\n<p>End include</p>\r\n</body></html>\r\n\r\ntest.shtml:\r\n<html>\r\n<body>\r\n<p>start</p>\r\n<pre>\r\n<!--#exec cmd="pwd" -->\r\n</pre>\r\n<p>end</p>\r\n</body>\r\n</html>\r\n\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-11668", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T18:49:26", "description": "Bugraq ID: 35115\r\nCVE ID\uff1aCVE-2009-1195\r\nCNCVE ID\uff1aCNCVE-20091195\r\n\r\nApache\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684WEB\u670d\u52a1\u7a0b\u5e8f\u3002\r\nApache\u5728\u5904\u7406".htaccess"\u6587\u4ef6\u4e2d\u7684"AllowOverride"\u548c\u90e8\u5206"options"\u53c2\u6570\u5b58\u5728\u9519\u8bef\uff0c\u53ef\u5bfc\u81f4\u901a\u8fc7SSI\u6267\u884c\u547d\u4ee4\u3002\r\n\u5982\u4e0b\u7684\u914d\u7f6e\u5b58\u5728\u5b89\u5168\u95ee\u9898\uff1a\r\na) \u5982\u679c"AllowOverride Options=IncludesNoEXEC"\u914d\u7f6e\u5728httpd.conf\u4e2d\uff0c\u7528\u6237\u53ef\u4ee5\u5728.htaccess\u6587\u4ef6\u4e2d\u8bbe\u7f6e"Options Includes"\uff0cSSI\u5c06\u4f1a\u4ee5exec=\u5141\u8bb8\u65b9\u5f0f\u542f\u7528\u3002\r\nb)\u5982\u679c"AllowOverride Options=IncludesNoEXEC"\u914d\u7f6e\u5728httpd.conf\u4e2d\uff0c"Options IncludesNoExec"\u5728\u76f8\u540c<Directory>\u4e0a\u4e0b\u6587\u542f\u7528\uff0c\u5728.htaccess\u6587\u4ef6\u4e2d\u8bbe\u7f6e"Options +IncludesNoExec"\u53ef\u5bfc\u81f4SSI\u5c06\u4f1a\u4ee5exec=\u5141\u8bb8\u65b9\u5f0f\u542f\u7528\u3002\n\nRedHat Enterprise Linux Desktop Workstation 5 client\r\nRedHat Enterprise Linux Desktop 5 client\r\nRedHat Enterprise Linux 5 server\r\nApache Software Foundation Apache 2.2.8\r\nApache Software Foundation Apache 2.2.6\r\nApache Software Foundation Apache 2.2.5\r\nApache Software Foundation Apache 2.2.4\r\nApache Software Foundation Apache 2.2.3\r\nApache Software Foundation Apache 2.2.2\r\nApache Software Foundation Apache 2.2.2\r\nApache Software Foundation Apache 2.2.2\r\nApache Software Foundation Apache 2.2.2\r\nApache Software Foundation Apache 2.2.2\r\nApache Software Foundation Apache 2.2.1\r\nApache Software Foundation Apache 2.2\n \u5382\u5546\u89e3\u51b3\u65b9\u6848\r\n\u53ef\u53c2\u8003\u5982\u4e0b\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\n<a href=\"http://www.apache.org/dist/httpd/CHANGES_2.2\" target=\"_blank\" rel=external nofollow>http://www.apache.org/dist/httpd/CHANGES_2.2</a>", "published": "2009-06-02T00:00:00", "type": "seebug", "title": "Apache HTTP Server "AllowOverride"\u548c"Options"\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2009-1195"], "modified": "2009-06-02T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-11501", "id": "SSV:11501", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T21:25:10", "description": "BUGTRAQ ID: 31692\r\nCVE ID\uff1aCVE-2008-1678\r\nCNCVE ID\uff1aCNCVE-20081678\r\n\r\nOpenSSL\u662f\u4e00\u79cd\u5f00\u653e\u6e90\u7801\u7684SSL\u5b9e\u73b0\uff0c\u7528\u6765\u5b9e\u73b0\u7f51\u7edc\u901a\u4fe1\u7684\u9ad8\u5f3a\u5ea6\u52a0\u5bc6\u3002\r\nOpenSSL 'zlib'\u538b\u7f29\u5e93\u5b58\u5728\u4e00\u4e2a\u5185\u5b58\u6cc4\u6f0f\u95ee\u9898\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u6d88\u8017\u5927\u91cf\u5185\u5b58\u800c\u5bf9\u670d\u52a1\u7a0b\u5e8f\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002\r\n\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\r\n\r\n\n\nAxis Communications 2130 PTZ Network Camera 0.9.8h\r\nAxis Communications 2130 PTZ Network Camera 0.9.8g\r\nAxis Communications 2130 PTZ Network Camera 0.9.8f\n \u6839\u636e\u62a5\u544aOpenSSL 0.9.8i\u5df2\u7ecf\u4fee\u6b63\u6b64\u6f0f\u6d1e\uff1a\r\n<a href=http://openssl.org/ target=_blank>http://openssl.org/</a>", "published": "2008-10-16T00:00:00", "type": "seebug", "title": "OpenSSL 'zlib'\u538b\u7f29\u5185\u5b58\u6cc4\u6f0f\u8fdc\u7a0b\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-1678"], "modified": "2008-10-16T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4254", "id": "SSV:4254", "sourceData": "", "sourceHref": "", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "cert": [{"lastseen": "2020-09-18T20:41:14", "bulletinFamily": "info", "cvelist": ["CVE-2008-2939"], "description": "### Overview \n\nThe Apache web server mod_proxy_ftp module contains a cross-site scripting (XSS) vulnerability. \n\n### Description \n\nThe Apache [mod_proxy_ftp](<http://httpd.apache.org/docs/2.0/mod/mod_proxy_ftp.html>) module allows the Apache web server to act as a proxy for FTP sites. Filename globbing is the process of using wildcards to match filenames. The mod_proxy_ftp module contains an XSS vulnerability that occurs because the module does not properly filter globbed characters in FTP URIs. \n \n--- \n \n### Impact \n\nA remote attacker may be able to execute arbitrary Javascript in the context of a site being proxied by the Apache server. \n \n--- \n \n### Solution \n\n**Upgrade**\n\nApache has released updates to address this issue. These updates are available on the Apache SVN server: \n[http://svn.apache.org/viewvc?view=rev&revision=682868](<http://svn.apache.org/viewvc?view=rev&revision=682868>) \n[http://svn.apache.org/viewvc?view=rev&revision=682870](<http://svn.apache.org/viewvc?view=rev&revision=682868>) \n[http://svn.apache.org/viewvc?view=rev&revision=682871](<http://svn.apache.org/viewvc?view=rev&revision=682871>) \n \nNote that vendors who distribute Apache may not have immediately have a version or update that contains these fixes. \n \n--- \n \n**Workarounds**\n\n * Mozilla Firefox users can use the [NoScript](<http://noscript.net/>) extension to keep Javascript from running in untrusted domains.\n * Application firewalls and IPS systems may be able to block certain types of XSS attacks at the network perimeter. \n--- \n \n### Vendor Information\n\n663763\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### Apache HTTP Server Project __ Affected\n\nUpdated: August 08, 2008 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nSee the below links for more details.\n\n[http://svn.apache.org/viewvc?view=rev&revision=682868](<http://svn.apache.org/viewvc?view=rev&revision=682868>) \n[http://svn.apache.org/viewvc?view=rev&revision=682870](<http://svn.apache.org/viewvc?view=rev&revision=682868>) \n[http://svn.apache.org/viewvc?view=rev&revision=682871](<http://svn.apache.org/viewvc?view=rev&revision=682871>)\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23663763 Feedback>).\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | | \nTemporal | | \nEnvironmental | | \n \n \n\n\n### References \n\n * <http://www.securityfocus.com/archive/1/495180>\n * [http://svn.apache.org/viewvc?view=rev&revision=682868](<http://svn.apache.org/viewvc?view=rev&revision=682868>)\n * [http://svn.apache.org/viewvc?view=rev&revision=682870](<http://svn.apache.org/viewvc?view=rev&revision=682870>)\n * [http://svn.apache.org/viewvc?view=rev&revision=682871](<http://svn.apache.org/viewvc?view=rev&revision=682871>)\n * <http://ftpsearch.ntua.gr/globbing.html>\n * <http://noscript.net/>\n\n### Acknowledgements\n\nThanks to Rapid7 and Apache for information that was used in this report.\n\nThis document was written by Ryan Giobbi.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2008-2939](<http://web.nvd.nist.gov/vuln/detail/CVE-2008-2939>) \n---|--- \n**Severity Metric:** | 2.70 \n**Date Public:** | 2008-08-06 \n**Date First Published:** | 2008-08-08 \n**Date Last Updated: ** | 2008-08-08 19:17 UTC \n**Document Revision: ** | 17 \n", "modified": "2008-08-08T19:17:00", "published": "2008-08-08T00:00:00", "id": "VU:663763", "href": "https://www.kb.cert.org/vuls/id/663763", "type": "cert", "title": "Apache mod_proxy_ftp XSS vulnerability", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "httpd": [{"lastseen": "2016-09-26T21:39:37", "bulletinFamily": "software", "cvelist": ["CVE-2008-2939"], "edition": 1, "description": "\nA flaw was found in the handling of wildcards in the path of a FTP\nURL with mod_proxy_ftp. If mod_proxy_ftp is enabled to support\nFTP-over-HTTP, requests containing globbing characters could lead\nto cross-site scripting (XSS) attacks.", "modified": "2008-10-31T00:00:00", "published": "2008-07-28T00:00:00", "id": "HTTPD:F915F9F6E76945F3AAD5C388A33DB861", "href": "https://httpd.apache.org/security_report.html", "type": "httpd", "title": "Apache Httpd < 2.2.10: mod_proxy_ftp globbing XSS", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2016-09-26T21:39:37", "bulletinFamily": "software", "cvelist": ["CVE-2008-2939"], "description": "\nA flaw was found in the handling of wildcards in the path of a FTP\nURL with mod_proxy_ftp. If mod_proxy_ftp is enabled to support\nFTP-over-HTTP, requests containing globbing characters could lead\nto cross-site scripting (XSS) attacks.", "edition": 1, "modified": "2010-10-19T00:00:00", "published": "2008-07-28T00:00:00", "id": "HTTPD:54489B5C624418B1219ADF0EF4175F11", "href": "https://httpd.apache.org/security_report.html", "type": "httpd", "title": "Apache Httpd < 2.0.64: mod_proxy_ftp globbing XSS", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2020-12-24T14:26:51", "bulletinFamily": "software", "cvelist": ["CVE-2008-2939"], "description": "\nA flaw was found in the handling of wildcards in the path of a FTP\nURL with mod_proxy_ftp. If mod_proxy_ftp is enabled to support\nFTP-over-HTTP, requests containing globbing characters could lead\nto cross-site scripting (XSS) attacks.", "edition": 5, "modified": "2008-08-05T00:00:00", "published": "2008-07-28T00:00:00", "id": "HTTPD:B090F624D6E5C8D80EAC520EE315082F", "href": "https://httpd.apache.org/security_report.html", "title": "Apache Httpd < None: mod_proxy_ftp globbing XSS", "type": "httpd", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2016-09-26T21:39:37", "bulletinFamily": "software", "cvelist": ["CVE-2009-1195"], "edition": 1, "description": "\nA flaw was found in the handling of the \"Options\" and \"AllowOverride\"\ndirectives. In configurations using the \"AllowOverride\" directive\nwith certain \"Options=\" arguments, local users were not restricted\nfrom executing commands from a Server-Side-Include script as intended.\n", "modified": "2009-07-27T00:00:00", "published": "2009-03-09T00:00:00", "id": "HTTPD:B50C2BDA6A4C5CD7D3B4D604ECB796ED", "href": "https://httpd.apache.org/security_report.html", "type": "httpd", "title": "Apache Httpd < 2.2.12: AllowOverride Options handling bypass", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2020-12-24T14:26:51", "bulletinFamily": "software", "cvelist": ["CVE-2009-1195"], "description": "\nA flaw was found in the handling of the \"Options\" and \"AllowOverride\"\ndirectives. In configurations using the \"AllowOverride\" directive\nwith certain \"Options=\" arguments, local users were not restricted\nfrom executing commands from a Server-Side-Include script as intended.\n", "edition": 5, "modified": "2009-04-22T00:00:00", "published": "2009-03-09T00:00:00", "id": "HTTPD:BF4AC3838A525A5586D2635616F83B3E", "href": "https://httpd.apache.org/security_report.html", "title": "Apache Httpd < None: AllowOverride Options handling bypass", "type": "httpd", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:17", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2939"], "description": "\nCVE Mitre reports:\n\nCross-site scripting (XSS) vulnerability in proxy_ftp.c in the\n\t mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\n\t in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\n\t allows remote attackers to inject arbitrary web script or HTML via a\n\t wildcard in the last directory component in the pathname in an FTP\n\t URI.\n\n", "edition": 4, "modified": "2008-07-25T00:00:00", "published": "2008-07-25T00:00:00", "id": "F1892066-0E74-11DE-92DE-000BCDC1757A", "href": "https://vuxml.freebsd.org/freebsd/f1892066-0e74-11de-92de-000bcdc1757a.html", "title": "apache -- Cross-site scripting vulnerability", "type": "freebsd", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:27", "bulletinFamily": "software", "cvelist": ["CVE-2008-2939"], "description": "Rapid7 Advisory R7-0033\r\nApache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting\r\n\r\n Discovered: July 25, 2008\r\n Published: August 5, 2008\r\n Revision: 1.1\r\n http://www.rapid7.com/advisories/R7-0033\r\n\r\n CVE: CVE-2008-2939\r\n\r\n1. Affected system(s):\r\n\r\n KNOWN VULNERABLE:\r\n o Apache HTTP Server 2.2.9 (and earlier 2.2.x versions)\r\n o Apache HTTP Server 2.0.63 (and earlier 2.0.x versions)\r\n\r\n NOT VULNERABLE:\r\n o Apache HTTP Server 1.3.x (because mod_proxy_ftp doesn't support \r\nwildcard\r\n characters)\r\n\r\n2. Summary\r\n\r\n The mod_proxy_ftp module of the Apache HTTP Server is vulnerable to a\r\n cross-site scripting vulnerability when handling requests with wildcard\r\n characters (aka globbing characters).\r\n\r\n3. Vendor status and information\r\n\r\n Apache HTTP Server Project\r\n http://httpd.apache.org\r\n\r\n The developers were notified of this vulnerability on July 28, 2008 via\r\n the private security mailing list security@apache.org. They\r\n acknowledged it within 12 hours. On July 29, they assigned it a CVE ID.\r\n On August 5, the vulnerability was fixed in all SVN branches:\r\n\r\n o Commit to main trunk:\r\n http://svn.apache.org/viewvc?view=rev&revision=682868\r\n o Commit to 2.2 branch:\r\n http://svn.apache.org/viewvc?view=rev&revision=682870\r\n o Commit to 2.0 branch:\r\n http://svn.apache.org/viewvc?view=rev&revision=682871\r\n\r\n4. Solution\r\n\r\n Upgrade to Apache HTTP Server 2.2.10 or 2.0.64 (as of August 6, these\r\n have not been released yet), or apply the patch from SVN commit\r\n r682868.\r\n\r\n5. Detailed analysis\r\n\r\n When Apache HTTP Server is configured with proxy support\r\n ("ProxyRequests On" in the configuration file), and when mod_proxy_ftp\r\n is enabled to support FTP-over-HTTP, requests containing wildcard\r\n characters (asterisk, tilde, opening square bracket, etc) such as:\r\n\r\n GET ftp://host/*<foo> HTTP/1.0\r\n\r\n lead to cross-site scripting in the response returned by mod_proxy_ftp:\r\n\r\n [...]\r\n <h2>Directory of <a href="/">ftp://host</a>/*<foo></h2>\r\n [...]\r\n\r\n To exploit this vulnerability, 'host' must be running an FTP server,\r\n and the last directory component of the path (the XSS payload) must\r\n be composed of at least 1 wildcard character and must not contain any\r\n forward slashes. In practice, this last requirement is not an obstacle\r\n at all to develop working exploits, example:\r\n\r\n ftp://host/*<img%20src=""%20onerror="alert(42)">\r\n\r\n6. Credit\r\n\r\n Discovered by Marc Bevand of Rapid7.\r\n \r\n7. Contact Information\r\n\r\n Rapid7, LLC\r\n Email: advisory@rapid7.com\r\n Web: http://www.rapid7.com\r\n Phone: +1 (617) 247-1717 \r\n\r\n8. Disclaimer and Copyright\r\n\r\n Rapid7, LLC is not responsible for the misuse of the information\r\n provided in our security advisories. These advisories are a service\r\n to the professional security community. There are NO WARRANTIES with\r\n regard to this information. Any application or distribution of this\r\n information constitutes acceptance AS IS, at the user's own risk.\r\n This information is subject to change without notice.\r\n\r\n This advisory Copyright (C) 2008 Rapid7, LLC. Permission is hereby\r\n granted to redistribute this advisory, providing that no changes are\r\n made and that the copyright notices and disclaimers remain intact.", "edition": 1, "modified": "2008-08-07T00:00:00", "published": "2008-08-07T00:00:00", "id": "SECURITYVULNS:DOC:20309", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:20309", "title": "Apache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:09:30", "bulletinFamily": "software", "cvelist": ["CVE-2008-2939"], "description": "Crossite scripting on FTP server content displaying.", "edition": 1, "modified": "2008-08-07T00:00:00", "published": "2008-08-07T00:00:00", "id": "SECURITYVULNS:VULN:9203", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9203", "title": "Apache mod_proxy_ftp crossite scripting", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:09:33", "bulletinFamily": "software", "cvelist": ["CVE-2009-1195"], "description": "Invalid IncludesNOEXEC option processing allows code execution via included .shtml files.", "edition": 1, "modified": "2009-06-01T00:00:00", "published": "2009-06-01T00:00:00", "id": "SECURITYVULNS:VULN:9951", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9951", "title": "Apache protection bypass", "type": "securityvulns", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:30", "bulletinFamily": "software", "cvelist": ["CVE-2008-2364", "CVE-2008-1678"], "description": "mod_proxy requests recursion, mod_ssl memory leak.", "edition": 1, "modified": "2008-07-12T00:00:00", "published": "2008-07-12T00:00:00", "id": "SECURITYVULNS:VULN:9145", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9145", "title": "Apache multiple DoS conditions", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "debian": [{"lastseen": "2020-11-11T13:30:55", "bulletinFamily": "unix", "cvelist": ["CVE-2009-1195"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1816-1 security@debian.org\nhttp://www.debian.org/security/ Stefan Fritsch\nJune 16, 2009 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : apache2\nVulnerability : insufficient security check\nProblem type : local\nDebian-specific: no\nCVE Id(s) : CVE-2009-1195\n\nIt was discovered that the Apache web server did not properly handle\nthe "Options=" parameter to the AllowOverride directive:\n\nIn the stable distribution (lenny), local users could (via .htaccess)\nenable script execution in Server Side Includes even in configurations\nwhere the AllowOverride directive contained only\nOptions=IncludesNoEXEC.\n\nIn the oldstable distribution (etch), local users could (via\n.htaccess) enable script execution in Server Side Includes and CGI\nscript execution in configurations where the AllowOverride directive\ncontained any "Options=" value.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 2.2.9-10+lenny3.\n\nThe oldstable distribution (etch), this problem has been fixed in\nversion 2.2.3-4+etch8.\n\nFor the testing distribution (squeeze) and the unstable distribution\n(sid), this problem will be fixed in version 2.2.11-6.\n\nThis advisory also provides updated apache2-mpm-itk packages which\nhave been recompiled against the new apache2 packages (except for the\ns390 architecture where updated packages will follow shortly).\n\nWe recommend that you upgrade your apache2 packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2.dsc\n Size/MD5 checksum: 676 60ae12c222f55bfb4d8741409f59807c\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch8.diff.gz\n Size/MD5 checksum: 126164 0f93fb2fea38521c4b2ac9411167e5af\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01.orig.tar.gz\n Size/MD5 checksum: 29071 63daaf8812777aacfd5a31ead4ff0061\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2.diff.gz\n Size/MD5 checksum: 12678 5019486d10734d7286f22e12da18764a\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3.orig.tar.gz\n Size/MD5 checksum: 6342475 f72ffb176e2dc7b322be16508c09f63c\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch8.dsc\n Size/MD5 checksum: 1068 c99d93533c181ea28ccdb61df0464319\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.2.3-4+etch8_all.deb\n Size/MD5 checksum: 274190 321a2158857f223fcb825d4b286ba06b\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch8_all.deb\n Size/MD5 checksum: 41386 1539cf468ace0922e31c6071dafd3813\n http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.3-4+etch8_all.deb\n Size/MD5 checksum: 6667722 f3242b4b8f5e5d33d9725a26d52a7300\n http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.3-4+etch8_all.deb\n Size/MD5 checksum: 2243290 99eca5a57510d9cd19ff74dd1bbd4a8e\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch8_alpha.deb\n Size/MD5 checksum: 407346 02cbc40c73aa9252a6f9bebda4036c29\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch8_alpha.deb\n Size/MD5 checksum: 345688 05ffdd8778436fd2b1dee6bd7aadd3e0\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch8_alpha.deb\n Size/MD5 checksum: 406728 779b119a6c99f7f8e0d8930cc1a2b71b\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2_alpha.deb\n Size/MD5 checksum: 184914 54d45ea160222856d8c4ed799d2965c9\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch8_alpha.deb\n Size/MD5 checksum: 449388 d925b5b3b9e271f4617a2efff0f3f143\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch8_alpha.deb\n Size/MD5 checksum: 444558 3ed40c6c95e4f25ef96906a636093249\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch8_alpha.deb\n Size/MD5 checksum: 1016788 3b4cac5858336e1553329e9a68d09be4\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch8_alpha.deb\n Size/MD5 checksum: 449926 317cb5e2564f48d8363090dee4e4e3c6\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch8_amd64.deb\n Size/MD5 checksum: 431928 7e2eb0a789bb596c5faa3727fcba90fb\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch8_amd64.deb\n Size/MD5 checksum: 436422 e91052469488153f4eba7f16c87ceaf9\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch8_amd64.deb\n Size/MD5 checksum: 408720 2c5044caf1e062d0d8b0e93ba93ac6f9\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch8_amd64.deb\n Size/MD5 checksum: 408032 cae76f94f7d177df301e9552aceb4d6d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch8_amd64.deb\n Size/MD5 checksum: 435932 4ceb0c8c090b1f7bfbd8aa82d57c59cb\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch8_amd64.deb\n Size/MD5 checksum: 999246 219fc26ca8cd984bc438104d44605937\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2_amd64.deb\n Size/MD5 checksum: 172486 6f417eb2e36992a871a0dde1da993beb\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch8_amd64.deb\n Size/MD5 checksum: 341854 1d184c79344b97beecc4eb66149ca787\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2_arm.deb\n Size/MD5 checksum: 157052 064a4b261c7c87d1453e0ef8f24040a5\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch8_arm.deb\n Size/MD5 checksum: 422376 95b22cb46098de8faa5ddbe7ec58d39e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch8_arm.deb\n Size/MD5 checksum: 418074 327c48d73d3c0bb8b0b96caaecf09bf2\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch8_arm.deb\n Size/MD5 checksum: 346068 5a80dc9ef10241686bc476295186d1a9\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch8_arm.deb\n Size/MD5 checksum: 411708 a8aeb7154505c044495a5f14411ee030\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch8_arm.deb\n Size/MD5 checksum: 410974 ad02726df7cfd95e06c99890d26dda34\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch8_arm.deb\n Size/MD5 checksum: 966462 a37249ba8653b6c553a78498e7b2733b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch8_arm.deb\n Size/MD5 checksum: 421624 6023d6e1ee900d32a9e0cac2d779f5e8\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch8_hppa.deb\n Size/MD5 checksum: 439778 4b7eae14ca66121b774ec5411233b4b5\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch8_hppa.deb\n Size/MD5 checksum: 445030 b8624eee4f538d3c059549968196affb\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2_hppa.deb\n Size/MD5 checksum: 179314 0e93ed4f1a1cb05301f1349567e02fac\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch8_hppa.deb\n Size/MD5 checksum: 349164 334215de79dcd6625c5450caa9acbe7f\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch8_hppa.deb\n Size/MD5 checksum: 444380 7f96d961edacfffbf3c56f7901738d0e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch8_hppa.deb\n Size/MD5 checksum: 410728 db0b7f3971c9685e6cb177d073395400\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch8_hppa.deb\n Size/MD5 checksum: 411470 fa1588a70ccb1fc7c3b6a4b1eb706cd2\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch8_hppa.deb\n Size/MD5 checksum: 1079530 ae385c50bf323e0ebf0ebf05916f7e43\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch8_i386.deb\n Size/MD5 checksum: 410030 491cb33c33069a65152763c62640ec3b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch8_i386.deb\n Size/MD5 checksum: 409026 136ba429f88601bddce9e261c355ac61\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch8_i386.deb\n Size/MD5 checksum: 962404 50c59f49871b94b73019354400fa94a7\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch8_i386.deb\n Size/MD5 checksum: 419810 1531365e5861f2d8a0c6ad8f5c3273eb\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch8_i386.deb\n Size/MD5 checksum: 423668 adf7a4964d1c145bf7837ecb5daedae2\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2_i386.deb\n Size/MD5 checksum: 160946 044399320ef1738117ea1d6044dc9535\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch8_i386.deb\n Size/MD5 checksum: 342468 d35f692addd12074d8203fa230763258\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch8_i386.deb\n Size/MD5 checksum: 424166 ea9c7365439a91c821b526719ab8ff90\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch8_ia64.deb\n Size/MD5 checksum: 497916 1e17fa920de9eb6c09bce020596cf049\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch8_ia64.deb\n Size/MD5 checksum: 406714 4ef8c9c7a67d3e72c6274602ffc991de\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2_ia64.deb\n Size/MD5 checksum: 231640 e5b34ca09f5c984fb800ff5acbb9ecc5\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch8_ia64.deb\n Size/MD5 checksum: 360332 c0f932682475bdc3feb480897dc97e5b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch8_ia64.deb\n Size/MD5 checksum: 497000 64cba409d52b1f2d34db4dc50b512e66\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch8_ia64.deb\n Size/MD5 checksum: 490794 7b88bcbeebdac0a86bdc12393851d5d1\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch8_ia64.deb\n Size/MD5 checksum: 407328 2889784b4d3bf76940b38787d2f23fff\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch8_ia64.deb\n Size/MD5 checksum: 1203858 0c507476d7f2d7b63fb3318172bace58\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch8_mips.deb\n Size/MD5 checksum: 349756 07a8dd34af1ad7870d29c41957c31cea\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2_mips.deb\n Size/MD5 checksum: 169706 fffc9c85cdc0a28f1f08a73e5dd02c4a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch8_mips.deb\n Size/MD5 checksum: 434452 9c42873f551df175b4f448c523168995\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch8_mips.deb\n Size/MD5 checksum: 406708 7603112d73d626e012c23bf285c75556\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch8_mips.deb\n Size/MD5 checksum: 407330 38b7c9902c37a4d2ee93e0902f385538\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch8_mips.deb\n Size/MD5 checksum: 429824 b8267443d16738bf176d420a169b67ab\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch8_mips.deb\n Size/MD5 checksum: 951304 d64d86437854e3d3888fc7656d4c5298\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch8_mips.deb\n Size/MD5 checksum: 433762 3c4dc1492967028a74d7568ac7bb789c\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2_mipsel.deb\n Size/MD5 checksum: 168564 543eeecd0699f938288f278200b61be4\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch8_mipsel.deb\n Size/MD5 checksum: 349992 77d2a556096c5b7ef06b121cee96e24a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch8_mipsel.deb\n Size/MD5 checksum: 433960 d4b0c05ca49012dbfffd3462a726750b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch8_mipsel.deb\n Size/MD5 checksum: 433292 2e394715947cd36daf57be5cbf55f870\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch8_mipsel.deb\n Size/MD5 checksum: 406716 f9e66ad34a8f5331f0381c76036c5d31\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch8_mipsel.deb\n Size/MD5 checksum: 951040 90f51e4e09ec64a25b55f302989484fe\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch8_mipsel.deb\n Size/MD5 checksum: 428624 5d44344017ce61171eed78cf2920a2e0\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch8_mipsel.deb\n Size/MD5 checksum: 407336 3b3ff30dbb3a91cf17d050389d83a8bc\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch8_powerpc.deb\n Size/MD5 checksum: 1035422 a3e8675f8e8fb38a7ab436c3c37cbc66\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch8_powerpc.deb\n Size/MD5 checksum: 406732 4977c800ccdb51e4ab331465e6dc5098\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch8_powerpc.deb\n Size/MD5 checksum: 431602 b8d9241002636e2d8caf5c9c716bb7a0\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch8_powerpc.deb\n Size/MD5 checksum: 427428 b00ddcdef0c6d905f3ed92c1848d84d4\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2_powerpc.deb\n Size/MD5 checksum: 168176 2d6d70b8084dbf6a67c1ff15b1e543f5\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch8_powerpc.deb\n Size/MD5 checksum: 432262 82f63a3d9c905503ed07497a509a5ece\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch8_powerpc.deb\n Size/MD5 checksum: 407352 9ccdacede7d530de110474a788fb6909\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch8_powerpc.deb\n Size/MD5 checksum: 353910 3c8dc1ccdbef3309927470ab938a6dc3\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch8_s390.deb\n Size/MD5 checksum: 406716 5ff574916b3b9d351424316a623f9ef0\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch8_s390.deb\n Size/MD5 checksum: 441864 09e4704cd6f68f9d83cbcefc4f0345b7\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch8_s390.deb\n Size/MD5 checksum: 348314 ffcf102df0a36eaec8c3d58b794ff463\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch8_s390.deb\n Size/MD5 checksum: 407332 35e1afec360a25970b394b45bd32352e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch8_s390.deb\n Size/MD5 checksum: 436990 6a9cbbafc74013c240c434670d915d45\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch8_s390.deb\n Size/MD5 checksum: 993892 dff5b55182674b99a8933efcea3bed17\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch8_s390.deb\n Size/MD5 checksum: 442910 6fabdebad5eb3c5c5316851b92a51520\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch8_sparc.deb\n Size/MD5 checksum: 959080 341fbc2906b146820bcf2afaf6db81e1\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch8_sparc.deb\n Size/MD5 checksum: 343614 92598890d7709acf3fb9612724344794\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch8_sparc.deb\n Size/MD5 checksum: 422064 88a1d8d85baf7013b54afea8be52c22a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch8_sparc.deb\n Size/MD5 checksum: 422480 974d10475b1ba4b4428800a9b2f149a1\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch8_sparc.deb\n Size/MD5 checksum: 409462 ce00bb75ae46f83c3b1141057c93fb22\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch8_sparc.deb\n Size/MD5 checksum: 418698 a4dd15e75a1d1542148fb86ac0f7aa4b\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch2_sparc.deb\n Size/MD5 checksum: 157646 446d2a738ba887694b30e83ce14cc2e1\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch8_sparc.deb\n Size/MD5 checksum: 408594 3a85b8b4c3d10b9a46474ea65c986e5f\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1.dsc\n Size/MD5 checksum: 1164 7935ba2d16af5ce14ff37c87bcf5975f\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1.diff.gz\n Size/MD5 checksum: 13112 315a131f6133bcecb9128ac01b6d2bb2\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny3.dsc\n Size/MD5 checksum: 1673 cbadd8b289a12b3f646c72a9f98edb22\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02.orig.tar.gz\n Size/MD5 checksum: 33295 1da861a142f8d0d2e2a5bfbc7c760199\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny3.diff.gz\n Size/MD5 checksum: 137227 c9b4da9312222075e97c68dd88760afc\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9.orig.tar.gz\n Size/MD5 checksum: 6396996 80d3754fc278338033296f0d41ef2c04\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny3_all.deb\n Size/MD5 checksum: 44648 eaa00e0c442f6923aaee5b3f3d63eabb\n http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.9-10+lenny3_all.deb\n Size/MD5 checksum: 6735640 312c8afd7ad4a42cef5b998e929d7307\n http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.9-10+lenny3_all.deb\n Size/MD5 checksum: 2059786 8ec25b1f4b421acdcb56b4c30a46adce\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_alpha.deb\n Size/MD5 checksum: 260960 04d13776c854965a67ab8d764c8498d2\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_alpha.deb\n Size/MD5 checksum: 255994 740f7cdf80fa4e17bb8545ac4b25d51b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_alpha.deb\n Size/MD5 checksum: 147300 4d7aca2119bb51b013a0ff391d8b8d92\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_alpha.deb\n Size/MD5 checksum: 847530 8291375605a5b212c5ccc26b78c6f3bd\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_alpha.deb\n Size/MD5 checksum: 83872 1431dcc6c44b4e8890d69a06f5006f43\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_alpha.deb\n Size/MD5 checksum: 261692 84001d0d6117a5f009919eb51ed6f80e\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1_alpha.deb\n Size/MD5 checksum: 198034 e45a8a807618cae19dc60645ad5b6fb8\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_alpha.deb\n Size/MD5 checksum: 2400870 923c90ac915375e4195640760a7ffd5e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_alpha.deb\n Size/MD5 checksum: 209180 d592aff9f840aba583480e3a113195ab\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_alpha.deb\n Size/MD5 checksum: 208132 59ce059623b37f1ffecb1de4a47b053c\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_alpha.deb\n Size/MD5 checksum: 82150 d32e5d3243747cfdb094d1472ba585a2\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_amd64.deb\n Size/MD5 checksum: 210724 d3307a871fa60b5cd318bcbff7861ddd\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_amd64.deb\n Size/MD5 checksum: 81960 a2ba8caee8f672343bd6b249e6f191b1\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_amd64.deb\n Size/MD5 checksum: 209642 3ffe10baf0a9c6baff0a5f302d6d7510\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_amd64.deb\n Size/MD5 checksum: 2453586 83a32644c7a35441efc6ed0f4de96004\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_amd64.deb\n Size/MD5 checksum: 253058 cdc0c6f4c8b7c6142d97d37c4aef3a29\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_amd64.deb\n Size/MD5 checksum: 144442 1aa9bee734246109ff024a4977c32be2\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_amd64.deb\n Size/MD5 checksum: 83566 5ec1d12cd31a702c812f0331e8ccd10f\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_amd64.deb\n Size/MD5 checksum: 257142 ae7d985ef90691476d424c675e2261b3\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_amd64.deb\n Size/MD5 checksum: 257804 813a24a8720e12bde6f643eee1a7669f\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_amd64.deb\n Size/MD5 checksum: 824476 bb35d1c614ebc7c55163c48feca8d58e\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1_amd64.deb\n Size/MD5 checksum: 195092 06b085d12f1dc12586899a93a9f772b1\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_arm.deb\n Size/MD5 checksum: 219370 7f09b0ef6cd87d1bbac58d86c4256fc5\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_arm.deb\n Size/MD5 checksum: 2325006 2b8ed07fdeec2cd0d8c8cb112af7df53\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_arm.deb\n Size/MD5 checksum: 210414 d7635cf8dd2bdebb366b4ecacb1af9ee\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_arm.deb\n Size/MD5 checksum: 146738 903517f0db34a1c03b25b879ba1f1b0d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_arm.deb\n Size/MD5 checksum: 80806 40aeed0b27b130793f46336ed89aae3a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_arm.deb\n Size/MD5 checksum: 224196 5f02dcbac874db09eac495c0d206bd03\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_arm.deb\n Size/MD5 checksum: 82642 b483ed5675948592a753fa03b3d81dd3\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_arm.deb\n Size/MD5 checksum: 209222 ae58b19a9d0c14e7c34a2aca294d72aa\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_arm.deb\n Size/MD5 checksum: 223316 a6397496006e1b3a09ea0f869f135977\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_arm.deb\n Size/MD5 checksum: 785826 5f4e189b47d97168b308859b70af9a22\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1_arm.deb\n Size/MD5 checksum: 161374 b1f9a8ff40c052e8d87757cbc3beb592\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_armel.deb\n Size/MD5 checksum: 150580 7825cbce15efe4a7af97f4fb7549150d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_armel.deb\n Size/MD5 checksum: 213274 60ed56dea822e4401b457556955fe660\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1_armel.deb\n Size/MD5 checksum: 162762 0c59b519e42a9c39ec3f02fa4cf0ed6a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_armel.deb\n Size/MD5 checksum: 212160 ba0296b1c9d4db4a94a01e24b6753d1f\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_armel.deb\n Size/MD5 checksum: 225754 00f6b6db56b6a43e5d503f91e693b369\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_armel.deb\n Size/MD5 checksum: 221358 1f8fea20ad0e9f8b68094b0a92d87227\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_armel.deb\n Size/MD5 checksum: 2338872 a4b77b17456e67228cf57cbacbdafd1e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_armel.deb\n Size/MD5 checksum: 81738 fe621e844baccf4ea059e25907a19043\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_armel.deb\n Size/MD5 checksum: 225508 f389b53ce88b010a39282d50a4910f07\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_armel.deb\n Size/MD5 checksum: 83374 c51a1cc2d9097f624fa01df96e1fa610\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_armel.deb\n Size/MD5 checksum: 801762 8dd8b1458212fae4fda37fee7aa988ef\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_hppa.deb\n Size/MD5 checksum: 241048 0876bed8af6c89ef0e27688f5ef444fb\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_hppa.deb\n Size/MD5 checksum: 245680 99af6a10e5145b68cfefa4e3d0e0d2a0\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1_hppa.deb\n Size/MD5 checksum: 183100 ca1c3270f0370918695d8b0008418266\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_hppa.deb\n Size/MD5 checksum: 2382666 cbfae2a9a0237f502d28a277e0fcba00\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_hppa.deb\n Size/MD5 checksum: 81636 9d180ec1ea22eb3822b0cc29dc21c614\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_hppa.deb\n Size/MD5 checksum: 212480 518b2a5003a8a6da31b9608cad871d67\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_hppa.deb\n Size/MD5 checksum: 245222 b6bdd76bd4ad86e93a8d70a69886b01d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_hppa.deb\n Size/MD5 checksum: 83466 ac4d6a327a73564d4b9cfd38d04d4836\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_hppa.deb\n Size/MD5 checksum: 895932 651f764ff8da1afb000b6b6a7811b72b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_hppa.deb\n Size/MD5 checksum: 152524 9089fa535ea812ce2f0a50b8d3539f4e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_hppa.deb\n Size/MD5 checksum: 211206 9753ba531e6e5dcbafaf106bbea6b83e\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_i386.deb\n Size/MD5 checksum: 210822 34090aeed35ed15ec8605f344d4c13f1\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_i386.deb\n Size/MD5 checksum: 782404 0094ac3350d87b5ac8896de7a63c56c6\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_i386.deb\n Size/MD5 checksum: 236912 2e212dfd60ad731fded5d0801003f3f3\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_i386.deb\n Size/MD5 checksum: 81758 6215a7f8a67e57813fddcaab50c7f351\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1_i386.deb\n Size/MD5 checksum: 178752 2e2d9d07f0fcd74f73352ea9f91ba4f6\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_i386.deb\n Size/MD5 checksum: 2321250 4027f4a596cd8b3b8473d07f9dd31118\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_i386.deb\n Size/MD5 checksum: 83514 b00c2bcbb431d2ae963fe0c8adb23bf3\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_i386.deb\n Size/MD5 checksum: 240432 3d82d54ffaa46778b9353ca212187f63\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_i386.deb\n Size/MD5 checksum: 142904 32b93602af8f9b38062b7027ae436f6c\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_i386.deb\n Size/MD5 checksum: 212150 89abf1c6028d02e25bdb5111197b3cbf\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_i386.deb\n Size/MD5 checksum: 240936 b6f3463734881e19af151308e6a7f979\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_ia64.deb\n Size/MD5 checksum: 312092 31eed5d2baa6f54457e14aa5994daa24\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1_ia64.deb\n Size/MD5 checksum: 246928 89d59bd8440528d32d8dbf8c67f7b8c2\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_ia64.deb\n Size/MD5 checksum: 311154 56e90eef5c72b67247defb4820373c0d\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_ia64.deb\n Size/MD5 checksum: 1035520 539cb93c643571b3fb9da67b876b19b1\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_ia64.deb\n Size/MD5 checksum: 83336 cfe707d16521258bacade34d23348abb\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_ia64.deb\n Size/MD5 checksum: 162190 c0140caac1352c14baf0b460e604e095\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_ia64.deb\n Size/MD5 checksum: 209164 896a1e94562985910dff035dfc6cfa0f\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_ia64.deb\n Size/MD5 checksum: 85232 f72991ec604760f132cc66676284a497\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_ia64.deb\n Size/MD5 checksum: 304110 e878c8a52500672de568f85f1761f2b0\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_ia64.deb\n Size/MD5 checksum: 2316332 2d77ef033f68aa9daab84b1a1eb03d5c\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_ia64.deb\n Size/MD5 checksum: 208120 99356379f8fa5739dbd2342891c9bb72\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_mips.deb\n Size/MD5 checksum: 211158 dc7c09460a987977e74a3d4d3bf77443\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_mips.deb\n Size/MD5 checksum: 147668 97e39853e85dde0b6910bd3510bfbf7c\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_mips.deb\n Size/MD5 checksum: 209758 ca74f255ffa335f9e00d997759e7b30e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_mips.deb\n Size/MD5 checksum: 228576 3208e4bb3b0f266da1ab8af5bdcfad68\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_mips.deb\n Size/MD5 checksum: 233070 20a66243833d02b71d762f0829228b8e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_mips.deb\n Size/MD5 checksum: 80894 501e7653339c21090196fa4d56ac3b24\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_mips.deb\n Size/MD5 checksum: 82590 d9346ac7b1fb3a393937e4002e4c4133\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_mips.deb\n Size/MD5 checksum: 232370 ee70fed7985b4898f7e2c20c705d986a\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1_mips.deb\n Size/MD5 checksum: 170708 ddc49e6045e6d668f00fca68c6c4b10f\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_mips.deb\n Size/MD5 checksum: 791490 576c92159fe1921133f39de55fe11543\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_mips.deb\n Size/MD5 checksum: 2467084 32d83497de741b187e98e1ca39620158\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_mipsel.deb\n Size/MD5 checksum: 209176 2084442d1f1353c9801be1804556868b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_mipsel.deb\n Size/MD5 checksum: 81496 a6782ca5d55a3cf21ca8aae7a2b06a2e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_mipsel.deb\n Size/MD5 checksum: 2416366 8bf0b8bd5a07c3bb3d60f6ee7ea9067e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_mipsel.deb\n Size/MD5 checksum: 208128 66e77d552e3d0a0daafce56cb12abb9e\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_mipsel.deb\n Size/MD5 checksum: 777776 701ce7ff8ffb4e35519e09e9aba5c6ad\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1_mipsel.deb\n Size/MD5 checksum: 169280 6aabc9dde533b9313d34bf9e944d68ec\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_mipsel.deb\n Size/MD5 checksum: 231470 6822cabe2397182403c1b1675ea39b3e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_mipsel.deb\n Size/MD5 checksum: 232076 fd1ed748d8e27399aa5e39cccdb47702\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_mipsel.deb\n Size/MD5 checksum: 83142 96315586a4226d3bb4edb520a0deec7c\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_mipsel.deb\n Size/MD5 checksum: 149474 e15801831962fdd291b0dc7bd403167f\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_mipsel.deb\n Size/MD5 checksum: 227420 2af6be8a2f25ecbd38951adfcade8587\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_powerpc.deb\n Size/MD5 checksum: 2495002 06dbcf702bbbaf91751c2b80bd1432e9\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_powerpc.deb\n Size/MD5 checksum: 915432 fa90e83d3416dea51c57eaa59fc0117d\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1_powerpc.deb\n Size/MD5 checksum: 195202 3472f152189de0c734e1b187463ed512\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_powerpc.deb\n Size/MD5 checksum: 256952 678fcbf02144236f519262200a0a6c78\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_powerpc.deb\n Size/MD5 checksum: 83994 0b72e758db1059bcbd831a8314264c3b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_powerpc.deb\n Size/MD5 checksum: 209194 21140b73b4a1d8a2653d86651da3d906\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_powerpc.deb\n Size/MD5 checksum: 160410 352db8aedcd33976e32a5b19e161208b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_powerpc.deb\n Size/MD5 checksum: 82324 20a2fe0dfbd7b8c0f992cbc3308245cc\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_powerpc.deb\n Size/MD5 checksum: 257672 e72b4475fdb00a5bd534a636381bff13\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_powerpc.deb\n Size/MD5 checksum: 252820 7e9ed2723bca1d5265e9faac11fd81d0\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_powerpc.deb\n Size/MD5 checksum: 208144 d7a129c653f0204201e57c325cdeb81f\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_s390.deb\n Size/MD5 checksum: 260010 856a89cbc82732fb6eeeec59b24e92f3\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_s390.deb\n Size/MD5 checksum: 259376 b3ce4c2df066a43c862daf0d4c10481e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_s390.deb\n Size/MD5 checksum: 83758 0c7d8c4e78804f6fb626c4ade8b5dd85\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_s390.deb\n Size/MD5 checksum: 822828 2e983322ce40a2decb57a8f3c327b6c5\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_s390.deb\n Size/MD5 checksum: 209158 c2194e9dea35991e7382ae6d7a13d27c\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_s390.deb\n Size/MD5 checksum: 150354 e630e02fbf4d2737d8c18926b10daea4\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_s390.deb\n Size/MD5 checksum: 81984 e86fc13619cfa97895f6fb8d01d0875f\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_s390.deb\n Size/MD5 checksum: 208110 17d5410ccc5ababac91cd6aa59779714\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_s390.deb\n Size/MD5 checksum: 2404766 80658db5d26bf1c57e60873972de8527\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_s390.deb\n Size/MD5 checksum: 255338 453f199307bd45d780ad16e90c74df31\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny3_sparc.deb\n Size/MD5 checksum: 2230590 17b3a416431d13b656ecf4443865c8bc\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny3_sparc.deb\n Size/MD5 checksum: 83108 2e39a88c888c98be86102304f09207af\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny3_sparc.deb\n Size/MD5 checksum: 81336 a02cdd28e35769081c9af2ca002414d6\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny3_sparc.deb\n Size/MD5 checksum: 240576 e7aee79ab59b85c1567d797f155eb5db\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny3_sparc.deb\n Size/MD5 checksum: 240130 690aebf49e843dc65421d5f5c83483f5\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny1_sparc.deb\n Size/MD5 checksum: 177346 7c8e0af57363f745be1e750c1fffd33f\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny3_sparc.deb\n Size/MD5 checksum: 780282 874ceed63b1787e2f019d88e0ecf0099\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny3_sparc.deb\n Size/MD5 checksum: 210360 dae12c355a736fbc39efa110292dac98\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny3_sparc.deb\n Size/MD5 checksum: 236310 693fe2172f132985a9bbec8267f091a1\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny3_sparc.deb\n Size/MD5 checksum: 147164 5cf3777dcc3d1d0a2932ddf24bb633f4\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny3_sparc.deb\n Size/MD5 checksum: 211656 a4d70f398d9a86a1546cefe4315aed2b\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 7, "modified": "2009-06-16T19:56:49", "published": "2009-06-16T19:56:49", "id": "DEBIAN:DSA-1816-1:3AAC6", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2009/msg00128.html", "title": "[SECURITY] [DSA 1816-1] New apache2 packages fix privilege escalation", "type": "debian", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}], "packetstorm": [{"lastseen": "2016-12-05T22:22:46", "description": "", "published": "2014-05-30T00:00:00", "type": "packetstorm", "title": "ProtonMail.ch Header Injection / CSRF", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-2939", "CVE-2011-3192"], "modified": "2014-05-30T00:00:00", "id": "PACKETSTORM:126851", "href": "https://packetstormsecurity.com/files/126851/ProtonMail.ch-Header-Injection-CSRF.html", "sourceData": "`SecurityAdvisory \n---------------- \n \n \nTime Line Vulnerability \n------------------------------- \n \n \n-Day 05-05-2014 Security Advisory => No response \n \n \n-Days 08 12 19-05-2014 Multiples Advisories => No Response \n \n \n-Day 20-05-2014 Full Disclosure \n \n \n \nAlerts summary \n******************** \n \n \n-CRLF injection/HTTP response splitting \n \n/crypt/cryptographp.php \ncfg \n \n \n-Apache 2.x version older than 2.2.6 \nWeb Server \n \n \n-Apache 2.x version older than 2.2.8 \nWeb Server \n \n \n-Apache 2.x version older than 2.2.9 \nWeb Server \n \n \n-Apache httpd remote denial of service \nWeb Server \n \n \n-HTML form without CSRF protection \n \n/blog \n/blog/transparency-report \n/blog/wp-login.php \n/blog/wp-login.php (cac6435f6386a7a635b3f12aeb81195e) \n/crypt \n/lander \n/login.php \n/report_bug.php \n/sign_up.php \n \n \n \n-Apache 2.x version older than 2.2.10 \n \nWeb Server \n \n \n-Clickjacking: X-Frame-Options header missing \n \nWeb Server \n \n \n-Sensitive page could be cached \n \n/sign_up.php (a18aae949b9855b60506dc83164afe7f) \n \n \n \n-Session Cookie without HttpOnly flag set \n/ \n \n \n \n-TRACE method is enabled \n \nWeb Server \n \n \n \n-Broken links \n \n/css/bootstrap.css \n/css/bs.css \n/pages/contact_us.php \n/pages/mit_license.php \nPassword type input with autocomplete enabled \n/blog/wp-login.php \n \n \n \n \nI. VULNERABILITY \n------------------------- \n \n \nThe ASAP-Sec Penetration Testers just explain faults exposed in the title \n \n \n#Title: ProtonMail.ch suffers from a CRLF injection-HTTP response \nsplitting / Apache 2.x version older than 2.2.6 -X.8 -X.9.- 2.2.10 / \nhttpd RemoteDoS / CSRF \n \n \n#Vendor:https://protonmail.ch:443/ \n \n \n#Author:Juan Carlos Garc\u00eda and Francisco Moraga \n \n \n#Follow us : http://www.highsec.es ||| Twitter:@secnight / @btshell1 \n \n \n \n \n \nII. DESCRIPTION \n------------------------- \n \n \n-ProtonMail is incorporated in Switzerland and their servers are located \nin Switzerland. \n \n \n-They are outside of US and EU jurisdiction and all user data is \nprotected by strict Swiss privacy laws. \n \nBecause of our end-to-end encryption, They think that : \n \n\"Your data is already secure and encrypted by the time it reaches our \nservers. We have no access to your messages, and since we cannot decrypt \nthem, we cannot share them with third parties\". \n \n \n-ProtonMail's segregated authentication and decryption system means \nlogging into a ProtonMail account that requires two passwords. \n \n \n-The first password is used to authenticate the user and retrieve the \ncorrect account. After that, encrypted data is sent to the user. \n \n \n-The second password is a decryption password which is never sent to us. \nIt is used to decrypt the user\u0092s data in the browser so we never have \naccess to the decrypted data \n \nor the decryption password. \n \n \n-For this reason, we are also unable to do password recovery. \n \n \n-If you forget your decryption password, we cannot recover your data. \n \n \n \n \nBy theWay, ASAP-SEC are Verifiying this information... Let's go to the \nbusiness ;) \n \n \n \n \n \nIII- Vulnerabilities \n--------------------- \n \n \nCRLF injection / HTTP response splitting \n**************************************** \n \n \nThis script is possibly vulnerable to CRLF injection attacks. \n \nHTTP headers have the structure \"Key: \n \nValue\", where each line is separated by the CRLF combination. \n \nIf the user input is injected into the value section without properly \nescaping/removing \n \nCRLF characters it is possible to alter the HTTP headers structure. \n \nHTTP Response Splitting is a \"new\" application attack technique which \nenables \n \nvarious new attacks such as web cache poisoning,cross user defacement, \n \nhijacking pages with sensitive user information and cross-site scripting \n(XSS). \n \n \nThe attacker sends a single HTTP request that forces the web server to \nform an output stream, \n \nwhich is then interpreted by the target as two HTTP responses instead of \none response. \n \n \nAffected items \n------------------ \n \n/crypt/cryptographp.php \n \n \n \nThe impact of this vulnerability \n---------------------------------- \n \nIs it possible for a remote attacker to inject custom HTTP headers. \n \nFor example, an attacker can inject session cookies or HTML code. \n \nThis may conduct to vulnerabilities like XSS (cross-site scripting) or \nsession fixation. \n \n \n \n \nHow to fix this vulnerability \n------------------------------------ \n \n \nYou need to restrict CR(0x13) and LF(0x10) \n \n \nFrom \n \nthe user input \n \nor \n \nproperly encode the output \n \nin \n \norder to prevent the injection \n \nof \n \ncustom HTTP headers. \n \n \n \n \nAttack details \n-------------------- \n \nURL encoded GET input cfg was set to \n<SomeCustomInjectedHeader:injected_by_secnight \n \n \n \nInjected header found: \n \nSomeCustomInjectedHeader: injected_by_secnight \n \n \n \nGET \n/crypt/cryptographp.php?cfg=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_secnight \n \n \n \n \n \nHTTP/1.0 302 Found \n \nDate: Wed, 28 May 2014 15:33:55 GMT \n \nServer: Apache/2.2.3 (CentOS) \n \nX-Powered-By: PHP/5.3.28 \n \nExpires: Thu, 19 Nov 1981 08:52:00 GMT \n \nCache-Control: no-store, no-cache, must-revalidate, post-check=0, \npre-check=0 \n \nPragma: no-cache \n \nSet-Cookie: cryptcookietest=1 \n \nLocation: cryptographp.inc.php?cfg= \n \nSomeCustomInjectedHeader: injected_by_secnight&sn=PHPSESSID& \n \nStrict-Transport-Security: max-age=15768000;includeSubDomains \n \nContent-Length: 0 \n \nConnection: close \n \nContent-Type: text/html \n \n \n \nHow to fix this vulnerability \n----------------------------- \n \n \nYou need to restrict CR(0x13) and LF(0x10) from the user \n \ninput or properly encode the output in order to prevent \n \nthe injection of custom HTTP headers. \n \n \n \n \n \nVariant 1 \n----------- \n \n \nGET \n/crypt/cryptographp.php?cfg=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_asapsec \nHTTP/1.1 \n \nReferer: https://protonmail.ch:443/ \n \nCookie: PHPSESSID=afaj9rt84m3oevgtld6thfe9l4; cryptcookietest=1 \n \nHost: protonmail.ch \n \nConnection: Keep-alive \n \n \nResponse \n---------- \n \n \nHTTP/1.0 302 Found \n \nDate: Wed, 28 May 2014 15:33:55 GMT \n \nServer: Apache/2.2.3 (CentOS) \n \nX-Powered-By: PHP/5.3.28 \n \nExpires: Thu, 19 Nov 1981 08:52:00 GMT \n \nCache-Control: no-store, no-cache, must-revalidate, post-check=0, \npre-check=0 \n \nPragma: no-cache \n \nSet-Cookie: cryptcookietest=1 \n \nLocation: cryptographp.inc.php?cfg= \n \nSomeCustomInjectedHeader: injected_by_wvs&sn=PHPSESSID& \n \nStrict-Transport-Security: max-age=15768000;includeSubDomains \n \nContent-Length: 0 \n \nConnection: close \n \nContent-Type: text/html \n \n \n \n \n \n \nApache 2.x version older than 2.2.10 \n************************************** \n \n \nFixed in Apache httpd 2.2.10: mod_proxy_ftp globbing XSS CVE-2008-2939 \n \nA flaw was found in the handling of wildcards in the path of a FTP URL \nwith mod_proxy_ftp. \n \nIf mod_proxy_ftp is enabled to support FTP-over-HTTP, requests \ncontaining globbing characters could lead to cross-site scripting (XSS) \nattacks. \n \nAffected Apache versions (2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, \n2.2.2, 2.2.0). \n \n \n \n \nApache httpd remote denial of service \n************************************* \n \n \nVulnerability description \n------------------------------ \n \n \nA denial of service vulnerability has been found in the way the multiple \n \noverlapping ranges are handled by the Apache HTTPD server: \n \n \n \n \nhttp://seclists.org/fulldisclosure/2011/Aug/175 \n \n \n \nAn attack tool is circulating in the wild. Active use of this tools has \nbeen observed. The attack can be done remotely \n \nand with a modest number of requests can cause very significant memory \nand CPU usage on the server. \n \n \nAffected Apache versions (1.3.x, 2.0.x through 2.0.64, and 2.2.x through \n2.2.19). \n \n \n \nHow to fix this vulnerability \n----------------------------- \nUpgrade to the latest version of Apache HTTP Server (2.2.20 or later), \navailable from the Apache HTTP Server Project Web site. \n \n \n \n \n \nWeb references \n-------------- \nCVE-2011-3192 \n \n \n \n \n \n \n \n \nSensitive page could be cached \n****************************** \n \n \nVulnerability description \n----------------------- \n \n \nThis page contains possible sensitive information (e.g. a password \nparameter) \n \nand could be potentially cached. Even in secure SSL channels sensitive \ndata could \n \nbe stored by intermediary proxies and SSL terminators. To prevent this, \na Cache-Control header should be specified. \n \nThis vulnerability affects \n \n \n/sign_up.php (a18aae949b9855b60506dc83164afe7f). \n \n \nGET /sign_up.php?username=urvimsoj HTTP/1.1 \n \nPragma: no-cache \n \nReferer: https://protonmail.ch/lander/ \n \n \nResponse \n---------- \n \nHTTP/1.0 200 OK \n \nDate: Sun, 18 May 2014 19:27:10 GMT \n \nServer: Apache/2.2.3 (CentOS) \n \nX-Powered-By: PHP/5.3.28 \n \nExpires: Thu, 19 Nov 1981 08:52:00 GMT \n \nCache-Control: no-store, no-cache, must-revalidate, post-check=0, \npre-check=0 \n \nPragma: no-cache \n \nStrict-Transport-Security: max-age=15768000;includeSubDomains \n \nConnection: close \n \nContent-Type: text/html \n \nContent-Length: 8285 \n \n \n \n \nHTML form without CSRF protection \n******************************** \n \n \nVulnerability description \n------------------------------ \n \n \nCross-site request forgery, also known as a one-click attack or session \nriding \nand abbreviated as CSRF or XSRF, is a type of malicious exploit of a \nwebsite \nwhereby unauthorized commands are transmitted from a user that the \nwebsite trusts. \n \nPenetration Tester (Authors) found a HTML form with no apparent CSRF \nprotection implemented. Consult details for more information about the \naffected HTML form. \n \n \nAffected items \n--------------- \n \n/blog \n/blog/transparency-report \n/blog/wp-login.php \n/blog/wp-login.php (cac6435f6386a7a635b3f12aeb81195e) \n/crypt \n/lander \n/login.php \n/report_bug.php \n/sign_up.php \n \n \n \nThe impact of this vulnerability \n-------------------------------- \n \n \nAn attacker may force the users of a web application to execute actions \nof the attacker's choosing. \n \nA successful CSRF exploit can compromise end user data and operation in \ncase of normal user. \n \nIf the targeted end user is the administrator account, this can \ncompromise the entire web application. \n \n \n \n \nHow to fix this vulnerability \n----------------------------- \n \n \nCheck if this form requires CSRF protection and implement CSRF \ncountermeasures if necessary. \n \n \n \nCREDITS \n------------------------- \n \nThis vulnerability has been discovered \n \nby Juan Carlos Garc\u00eda(@secnight) \n \nand \n \nFrancisco Moraga (@btshell) \n \n \n \n \nVII. LEGAL NOTICES \n------------------------- \n \nThe Authors accepts no responsibility for any damage \ncaused by the use or misuse of this information. \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n`\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/126851/protonmail-csrfheader.txt"}], "f5": [{"lastseen": "2016-11-09T00:09:44", "bulletinFamily": "software", "cvelist": ["CVE-2008-1678", "CVE-2009-4355"], "edition": 1, "description": "Recommended Action\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents.\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n", "modified": "2014-07-10T00:00:00", "published": "2014-07-10T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15405.html", "id": "SOL15405", "title": "SOL15405 - OpenSSL 0.9.8l vulnerability CVE-2009-4355", "type": "f5", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2008-1678", "CVE-2008-2364"], "description": "The Apache HTTP Server is a powerful, efficient, and extensible web server. ", "modified": "2008-08-07T23:48:09", "published": "2008-08-07T23:48:09", "id": "FEDORA:31EE01AD0FF", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 9 Update: httpd-2.2.9-1.fc9", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}