Nessus Plugin #15369
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[DSA532] DSA-532-2 libapache-mod-ssl
- Family:
- Debian Local Security Checks
- Category:
- infos
- Copyright:
- This script is (C) 2004 Michel Arboi
- Summary:
- DSA-532-2 libapache-mod-ssl
- Version:
- $Revision: 1.4 $
- Cve_id:
- CAN-2004-0488, CAN-2004-0700
- Bugtraq_id:
- -
- Xrefs:
- DSA:532
- Description:
Two vulnerabilities were discovered in libapache-mod-ssl:
Stack-based buffer overflow in the
ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl,
when mod_ssl is configured to trust the issuing CA, may allow remote
attackers to execute arbitrary code via a client certificate with a
long subject DN.
Format string vulnerability in the ssl_log function
in ssl_engine_log.c in mod_ssl 2.8.19 for Apache 1.3.31 may allow
remote attackers to execute arbitrary messages via format string
specifiers in certain log messages for HTTPS.
For the current stable distribution (woody), these problems have been
fixed in version 2.8.9-2.4.
For the unstable distribution (sid), CAN-2004-0488 was fixed in
version 2.8.18, and CAN-2004-0700 will be fixed soon.
We recommend that you update your libapache-mod-ssl package.
Solution : http://www.debian.org/security/2004/dsa-532
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.