📄 deb_188_1.nasl
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 188-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(53737); script_cve_id("CVE-2002-0839", "CVE-2002-0840", "CVE-2002-0843", "CVE-2001-0131", "CVE-2002-1233"); script_bugtraq_id(5847,5884,5887); script_version ("$"); name["english"] = "Debian Security Advisory DSA 188-1 (apache-ssl)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to apache-sslannounced via advisory DSA 188-1.According to David Wagner, iDEFENSE and the Apache HTTP ServerProject, several vulnerabilities have been found in the Apachepackage, a commonly used webserver. Most of the code is sharedbetween the Apache and Apache-SSL packages, so vulnerabilities areshared as well. These vulnerabilities could allow an attacker toenact a denial of service against a server or execute a crossscripting attack, or steal cookies from other web site users.Vulnerabilities in the included lecacy programs htdigest, htpasswd andApacheBench can be exploited when called via CGI. Additionally theinsecure temporary file creation in htdigest and htpasswd can also beexploited locally. The Common Vulnerabilities and Exposures (CVE)project identified the following vulnerabilities:1. CVE-2002-0839: A vulnerability exists on platforms using System Vshared memory based scoreboards. This vulnerability allows anattacker to execute code under the Apache UID to exploit the Apacheshared memory scoreboard format and send a signal to any process asroot or cause a local denial of service attack.2. CVE-2002-0840: Apache is susceptible to a cross site scriptingvulnerability in the default 404 page of any web server hosted on adomain that allows wildcard DNS lookups.3. CVE-2002-0843: There were some possible overflows in the utilityApacheBench (ab) which could be exploited by a malicious server.4. CVE-2002-1233: A race condition in the htpasswd and htdigestprogram enables a malicious local user to read or even modify thecontents of a password file or easily create and overwrite files asthe user running the htpasswd (or htdigest respectively) program.5. CVE-2001-0131: htpasswd and htdigest in Apache 2.0a9, 1.3.14, andothers allows local users to overwrite arbitrary files via asymlink attack.This is the same vulnerability as CVE-2002-1233, which was fixed inpotato already but got lost later and was never applied upstream.5. NO-CAN: Several buffer overflows have been found in the ApacheBench(ab) utility that could be exploited by a remote server returningvery long strings.These problems have been fixed in version 1.3.26.1+1.48-0woody3 forthe current stable distribution (woody) and in 1.3.9.13-4.2 for theold stable distribution (potato). Corrected packages for the unstabledistribution (sid) are expected soon.We recommend that you upgrade your Apache-SSL package immediately.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20188-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 188-1 (apache-ssl)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"apache-ssl", ver:"1.3.9.13-4.2", rls:"DEB2.2")) { vuln = 1;}if(isdpkgvuln(pkg:"apache-ssl", ver:"1.3.26.1+1.48-0woody3", rls:"DEB3.0")) { vuln = 1;}if(vuln) { security_hole(0);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -