Thank you,
Will N.
Texas A&M University
------------------------------------------------------------
- Code: Select all
. Warning found on port http (80/tcp)
Synopsis :
The remote web server may be affected by a denial of service
vulnerability.
Description :
According to its banner, the version of Apache 2.2 installed on the
remote host is older than 2.2.18. Such versions are affected by a
denial of service vulnerability due to an error in the 'apr_fnmatch'
match function of the bundled APR library.
If mod_autoindex is enabled and has indexed a directory containing
files whose filenames are long, an attacker can cause high CPU usage
with a specially crafted request.
Note that the remote web server may not actually be affected by this
vulnerability. Nessus did not try to determine whether the affected
module is in use or to check for the issue itself.
See also :
http://www.apache.org/dist/httpd/CHANGES_2.2.18
http://httpd.apache.org/security/vulnerabilities_22.html#2.2.18
http://securityreason.com/achievement_securityalert/98
Solution :
Either ensure the 'IndexOptions' configuration option is set to
'IgnoreClient' or upgrade to Apache version 2.2.18 or later.
Risk factor :
Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true
Plugin output :
Version source : Server: Apache/2.2.17
Installed version : 2.2.17
Fixed version : 2.2.18
CVE : CVE-2011-0419
BID : 47820
Other references : OSVDB:73388, Secunia:44574
. Warning found on port http (80/tcp)
Synopsis :
The remote web server may be affected by a denial
of service vulnerability.
Description :
According to its banner, the version of Apache 2.2 installed on the
remote host is earlier than 2.2.21. It therefore is potentially
affected by a denial of service vulnerability.
An error exists in the 'mod_proxy_ajp' module that can allow
specially crafted HTTP requests to cause a backend server to
temporarily enter an error state. This vulnerability only occurs
when 'mod_proxy_ajp' is used along with 'mod_proxy_balancer'.
Note that Nessus did not actually test for the flaws but instead has
relied on the version in the server's banner.
See also :
http://www.apache.org/dist/httpd/CHANGES_2.2.21
http://httpd.apache.org/security/vulnerabilities_22.html
Solution :
Upgrade to Apache version 2.2.21 or later.
Risk factor :
Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true
Plugin output :
Version source : Server: Apache/2.2.17
Installed version : 2.2.17
Fixed version : 2.2.21
CVE : CVE-2011-3348
BID : 49616
Other references : OSVDB:75647