Vulnerabilities > CVE-2013-4352 - Unspecified vulnerability in Apache Http Server 2.4.6

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
apache
nessus

Summary

The cache_invalidate function in modules/cache/cache_storage.c in the mod_cache module in the Apache HTTP Server 2.4.6, when a caching forward proxy is enabled, allows remote HTTP servers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger a missing hostname value.

Vulnerable Configurations

Part Description Count
Application
Apache
1

Nessus

  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2014-503.NASL
    descriptionThis apache2 update fixes the following security issues : - fix for crash in mod_proxy processing specially crafted requests with reverse proxy configurations that results in a crash and a DoS condition for the server. CVE-2014-0117 - new config option CGIDScriptTimeout set to 60s in new file conf.d/cgid-timeout.conf, preventing worker processes hanging forever if a cgi launched from them has stopped reading input from the server (DoS). CVE-2014-0231 - Fix for a NULL pointer dereference in mod_cache that causes a crash in caching forwarding configurations, resulting in a DoS condition. CVE-2013-4352 - fix for crash in parsing cookie content, resulting in a DoS against the server CVE-2014-0098 - fix for mod_status race condition in scoreboard handling and consecutive heap overflow and information disclosure if access to mod_status is granted to a potential attacker. CVE-2014-0226 - fix for improper handling of whitespace characters from CDATA sections to mod_dav, leading to a crash and a DoS condition of the apache server process CVE-2013-6438
    last seen2020-06-05
    modified2014-08-21
    plugin id77292
    published2014-08-21
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77292
    titleopenSUSE Security Update : apache2 (openSUSE-SU-2014:1044-1)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2014-503.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(77292);
      script_version("1.8");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2013-4352", "CVE-2013-6438", "CVE-2014-0098", "CVE-2014-0117", "CVE-2014-0226", "CVE-2014-0231");
    
      script_name(english:"openSUSE Security Update : apache2 (openSUSE-SU-2014:1044-1)");
      script_summary(english:"Check for the openSUSE-2014-503 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This apache2 update fixes the following security issues :
    
      - fix for crash in mod_proxy processing specially crafted
        requests with reverse proxy configurations that results
        in a crash and a DoS condition for the server.
        CVE-2014-0117
    
      - new config option CGIDScriptTimeout set to 60s in new
        file conf.d/cgid-timeout.conf, preventing worker
        processes hanging forever if a cgi launched from them
        has stopped reading input from the server (DoS).
        CVE-2014-0231
    
      - Fix for a NULL pointer dereference in mod_cache that
        causes a crash in caching forwarding configurations,
        resulting in a DoS condition. CVE-2013-4352
    
      - fix for crash in parsing cookie content, resulting in a
        DoS against the server CVE-2014-0098
    
      - fix for mod_status race condition in scoreboard handling
        and consecutive heap overflow and information disclosure
        if access to mod_status is granted to a potential
        attacker. CVE-2014-0226
    
      - fix for improper handling of whitespace characters from
        CDATA sections to mod_dav, leading to a crash and a DoS
        condition of the apache server process CVE-2013-6438"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=869105"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=869106"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=887765"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=887767"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=887768"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=887771"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.opensuse.org/opensuse-updates/2014-08/msg00031.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected apache2 packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-event");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-event-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-example-pages");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-prefork");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-prefork-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-utils");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-utils-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-worker");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:apache2-worker-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/08/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/08/21");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-debuginfo-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-debugsource-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-devel-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-event-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-event-debuginfo-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-example-pages-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-prefork-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-prefork-debuginfo-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-utils-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-utils-debuginfo-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-worker-2.4.6-6.27.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"apache2-worker-debuginfo-2.4.6-6.27.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "apache2 / apache2-debuginfo / apache2-debugsource / apache2-devel / etc");
    }
    
  • NASL familyWeb Servers
    NASL idAPACHE_2_4_7.NASL
    descriptionAccording to its banner, the version of Apache 2.4.x running on the remote host is version 2.4.6. It is, therefore, affected by a flaw in the mod_cache module involving a NULL pointer dereference. An attacker may be able to specially craft a request designed to cause a denial of service. Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id76914
    published2014-07-30
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/76914
    titleApache 2.4.6 Remote DoS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(76914);
      script_version("1.6");
      script_cvs_date("Date: 2018/06/29 12:01:03");
    
      script_cve_id("CVE-2013-4352");
      script_bugtraq_id(68863);
    
      script_name(english:"Apache 2.4.6 Remote DoS");
      script_summary(english:"Checks version in Server response header.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote web server is affected by a denial of service
    vulnerability.");
      script_set_attribute(attribute:"description", value:
    "According to its banner, the version of Apache 2.4.x running on the
    remote host is version 2.4.6. It is, therefore, affected by a flaw in
    the mod_cache module involving a NULL pointer dereference. An attacker
    may be able to specially craft a request designed to cause a denial of
    service.
    
    Note that Nessus has not tested for this issue but has instead relied
    only on the application's self-reported version number.");
      script_set_attribute(attribute:"see_also", value:"http://httpd.apache.org/security/vulnerabilities_24.html");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Apache version 2.4.7 or later. Alternatively, ensure that
    the affected module is not in use");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/07/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/11/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/07/30");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:http_server");
    
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
    
      script_dependencies("apache_http_version.nasl");
      script_require_keys("installed_sw/Apache");
      script_require_ports("Services/www", 80);
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    include("install_func.inc");
    
    get_install_count(app_name:"Apache", exit_if_zero:TRUE);
    port = get_http_port(default:80);
    install = get_single_install(app_name:"Apache", port:port, exit_if_unknown_ver:TRUE);
    
    # Check if we could get a version first, then check if it was
    # backported
    version = get_kb_item_or_exit('www/apache/'+port+'/version', exit_code:1);
    backported = get_kb_item_or_exit('www/apache/'+port+'/backported', exit_code:1);
    
    if (report_paranoia < 2 && backported) audit(AUDIT_BACKPORT_SERVICE, port, "Apache web server");
    source = get_kb_item_or_exit('www/apache/'+port+'/source', exit_code:1);
    
    # Check if the version looks like either ServerTokens Major/Minor was used.
    if (version =~ '^2(\\.[34])?$') exit(1, "The banner from the Apache server listening on port "+port+" - "+source+" - is not granular enough to make a determination.");
    
    # This plugin is only concerned with Apache 2.4 (and its associated development branch).
    if (version !~ "^2\.[34][^0-9]") audit(AUDIT_WRONG_WEB_SERVER, port, "Apache 2.4.x");
    
    if (
      version =~ "^2\.3($|[^0-9])" ||
      version =~ "^2\.4\.6($|[^0-9])"
    )
    {
      if (report_verbosity > 0)
      {
        report =
          '\n  Version source    : ' + source +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : 2.4.7' +
          '\n';
        security_warning(port:port, extra:report);
      }
      else security_warning(port);
      exit(0);
    }
    else audit(AUDIT_LISTEN_NOT_VULN, "Apache", port, install["version"]);
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2014-0921.NASL
    descriptionFrom Red Hat Security Advisory 2014:0921 : Updated httpd packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the
    last seen2020-06-01
    modified2020-06-02
    plugin id76745
    published2014-07-24
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/76745
    titleOracle Linux 7 : httpd (ELSA-2014-0921)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2014:0921 and 
    # Oracle Linux Security Advisory ELSA-2014-0921 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(76745);
      script_version("1.18");
      script_cvs_date("Date: 2019/09/30 10:58:19");
    
      script_cve_id("CVE-2013-4352", "CVE-2014-0117", "CVE-2014-0118", "CVE-2014-0226", "CVE-2014-0231");
      script_bugtraq_id(68678, 68740, 68742, 68745, 68863);
      script_xref(name:"RHSA", value:"2014:0921");
    
      script_name(english:"Oracle Linux 7 : httpd (ELSA-2014-0921)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Oracle Linux host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "From Red Hat Security Advisory 2014:0921 :
    
    Updated httpd packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 7.
    
    The Red Hat Security Response Team has rated this update as having
    Important security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    The httpd packages provide the Apache HTTP Server, a powerful,
    efficient, and extensible web server.
    
    A race condition flaw, leading to heap-based buffer overflows, was
    found in the mod_status httpd module. A remote attacker able to access
    a status page served by mod_status on a server using a threaded
    Multi-Processing Module (MPM) could send a specially crafted request
    that would cause the httpd child process to crash or, possibly, allow
    the attacker to execute arbitrary code with the privileges of the
    'apache' user. (CVE-2014-0226)
    
    A NULL pointer dereference flaw was found in the mod_cache httpd
    module. A malicious HTTP server could cause the httpd child process to
    crash when the Apache HTTP Server was used as a forward proxy with
    caching. (CVE-2013-4352)
    
    A denial of service flaw was found in the mod_proxy httpd module. A
    remote attacker could send a specially crafted request to a server
    configured as a reverse proxy using a threaded Multi-Processing
    Modules (MPM) that would cause the httpd child process to crash.
    (CVE-2014-0117)
    
    A denial of service flaw was found in the way httpd's mod_deflate
    module handled request body decompression (configured via the
    'DEFLATE' input filter). A remote attacker able to send a request
    whose body would be decompressed could use this flaw to consume an
    excessive amount of system memory and CPU on the target system.
    (CVE-2014-0118)
    
    A denial of service flaw was found in the way httpd's mod_cgid module
    executed CGI scripts that did not read data from the standard input. A
    remote attacker could submit a specially crafted request that would
    cause the httpd child process to hang indefinitely. (CVE-2014-0231)
    
    All httpd users are advised to upgrade to these updated packages,
    which contain backported patches to correct these issues. After
    installing the updated packages, the httpd daemon will be restarted
    automatically."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2014-July/004292.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected httpd packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:httpd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:httpd-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:httpd-manual");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:httpd-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:mod_ldap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:mod_proxy_html");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:mod_session");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:mod_ssl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/07/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/07/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/07/24");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Oracle Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
    os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 7", "Oracle Linux " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
    if ("x86_64" >!< cpu) audit(AUDIT_ARCH_NOT, "x86_64", cpu);
    
    flag = 0;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"httpd-2.4.6-18.0.1.el7_0")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"httpd-devel-2.4.6-18.0.1.el7_0")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"httpd-manual-2.4.6-18.0.1.el7_0")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"httpd-tools-2.4.6-18.0.1.el7_0")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"mod_ldap-2.4.6-18.0.1.el7_0")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"mod_proxy_html-2.4.6-18.0.1.el7_0")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"mod_session-2.4.6-18.0.1.el7_0")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"mod_ssl-2.4.6-18.0.1.el7_0")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "httpd / httpd-devel / httpd-manual / httpd-tools / mod_ldap / etc");
    }
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2014-0921.NASL
    descriptionUpdated httpd packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the
    last seen2020-06-01
    modified2020-06-02
    plugin id76716
    published2014-07-24
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/76716
    titleCentOS 7 : httpd (CESA-2014:0921)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2014:0921 and 
    # CentOS Errata and Security Advisory 2014:0921 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(76716);
      script_version("1.14");
      script_cvs_date("Date: 2020/01/06");
    
      script_cve_id("CVE-2013-4352", "CVE-2014-0117", "CVE-2014-0118", "CVE-2014-0226", "CVE-2014-0231");
      script_xref(name:"RHSA", value:"2014:0921");
    
      script_name(english:"CentOS 7 : httpd (CESA-2014:0921)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated httpd packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 7.
    
    The Red Hat Security Response Team has rated this update as having
    Important security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    The httpd packages provide the Apache HTTP Server, a powerful,
    efficient, and extensible web server.
    
    A race condition flaw, leading to heap-based buffer overflows, was
    found in the mod_status httpd module. A remote attacker able to access
    a status page served by mod_status on a server using a threaded
    Multi-Processing Module (MPM) could send a specially crafted request
    that would cause the httpd child process to crash or, possibly, allow
    the attacker to execute arbitrary code with the privileges of the
    'apache' user. (CVE-2014-0226)
    
    A NULL pointer dereference flaw was found in the mod_cache httpd
    module. A malicious HTTP server could cause the httpd child process to
    crash when the Apache HTTP Server was used as a forward proxy with
    caching. (CVE-2013-4352)
    
    A denial of service flaw was found in the mod_proxy httpd module. A
    remote attacker could send a specially crafted request to a server
    configured as a reverse proxy using a threaded Multi-Processing
    Modules (MPM) that would cause the httpd child process to crash.
    (CVE-2014-0117)
    
    A denial of service flaw was found in the way httpd's mod_deflate
    module handled request body decompression (configured via the
    'DEFLATE' input filter). A remote attacker able to send a request
    whose body would be decompressed could use this flaw to consume an
    excessive amount of system memory and CPU on the target system.
    (CVE-2014-0118)
    
    A denial of service flaw was found in the way httpd's mod_cgid module
    executed CGI scripts that did not read data from the standard input. A
    remote attacker could submit a specially crafted request that would
    cause the httpd child process to hang indefinitely. (CVE-2014-0231)
    
    All httpd users are advised to upgrade to these updated packages,
    which contain backported patches to correct these issues. After
    installing the updated packages, the httpd daemon will be restarted
    automatically."
      );
      # https://lists.centos.org/pipermail/centos-announce/2014-July/020442.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?a5e3a583"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected httpd packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0226");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:httpd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:httpd-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:httpd-manual");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:httpd-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:mod_ldap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:mod_proxy_html");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:mod_session");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:mod_ssl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/07/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/07/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/07/24");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 7.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"httpd-2.4.6-18.el7.centos")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"httpd-devel-2.4.6-18.el7.centos")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"httpd-manual-2.4.6-18.el7.centos")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"httpd-tools-2.4.6-18.el7.centos")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"mod_ldap-2.4.6-18.el7.centos")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"mod_proxy_html-2.4.6-18.el7.centos")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"mod_session-2.4.6-18.el7.centos")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"mod_ssl-2.4.6-18.el7.centos")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "httpd / httpd-devel / httpd-manual / httpd-tools / mod_ldap / etc");
    }
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS11_APACHE_20141014.NASL
    descriptionThe remote Solaris system is missing necessary patches to address security updates : - The cache_invalidate function in modules/cache/cache_storage.c in the mod_cache module in the Apache HTTP Server 2.4.6, when a caching forward proxy is enabled, allows remote HTTP servers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger a missing hostname value. (CVE-2013-4352) - The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header. (CVE-2014-0117) - The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size. (CVE-2014-0118) - Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c. (CVE-2014-0226) - The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor. (CVE-2014-0231)
    last seen2020-06-01
    modified2020-06-02
    plugin id80589
    published2015-01-19
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80589
    titleOracle Solaris Third-Party Patch Update : apache (multiple_denial_of_service_dos5)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from the Oracle Third Party software advisories.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(80589);
      script_version("1.5");
      script_cvs_date("Date: 2018/11/15 20:50:24");
    
      script_cve_id("CVE-2013-4352", "CVE-2014-0117", "CVE-2014-0118", "CVE-2014-0226", "CVE-2014-0231");
    
      script_name(english:"Oracle Solaris Third-Party Patch Update : apache (multiple_denial_of_service_dos5)");
      script_summary(english:"Check for the 'entire' version.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Solaris system is missing a security patch for third-party
    software."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote Solaris system is missing necessary patches to address
    security updates :
    
      - The cache_invalidate function in
        modules/cache/cache_storage.c in the mod_cache module in
        the Apache HTTP Server 2.4.6, when a caching forward
        proxy is enabled, allows remote HTTP servers to cause a
        denial of service (NULL pointer dereference and daemon
        crash) via vectors that trigger a missing hostname
        value. (CVE-2013-4352)
    
      - The mod_proxy module in the Apache HTTP Server 2.4.x
        before 2.4.10, when a reverse proxy is enabled, allows
        remote attackers to cause a denial of service
        (child-process crash) via a crafted HTTP Connection
        header. (CVE-2014-0117)
    
      - The deflate_in_filter function in mod_deflate.c in the
        mod_deflate module in the Apache HTTP Server before
        2.4.10, when request body decompression is enabled,
        allows remote attackers to cause a denial of service
        (resource consumption) via crafted request data that
        decompresses to a much larger size. (CVE-2014-0118)
    
      - Race condition in the mod_status module in the Apache
        HTTP Server before 2.4.10 allows remote attackers to
        cause a denial of service (heap-based buffer overflow),
        or possibly obtain sensitive credential information or
        execute arbitrary code, via a crafted request that
        triggers improper scoreboard handling within the
        status_handler function in
        modules/generators/mod_status.c and the
        lua_ap_scoreboard_worker function in
        modules/lua/lua_request.c. (CVE-2014-0226)
    
      - The mod_cgid module in the Apache HTTP Server before
        2.4.10 does not have a timeout mechanism, which allows
        remote attackers to cause a denial of service (process
        hang) via a request to a CGI script that does not read
        from its stdin file descriptor. (CVE-2014-0231)"
      );
      # https://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?4a913f44"
      );
      # https://blogs.oracle.com/sunsecurity/multiple-denial-of-servicedos-vulnerabilities-in-apache-http-server
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?104d170e"
      );
      script_set_attribute(attribute:"solution", value:"Upgrade to Solaris 11.2.2.5.0.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:11.2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:apache");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/10/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/01/19");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris11/release", "Host/Solaris11/pkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("solaris.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Solaris11/release");
    if (isnull(release)) audit(AUDIT_OS_NOT, "Solaris11");
    pkg_list = solaris_pkg_list_leaves();
    if (isnull (pkg_list)) audit(AUDIT_PACKAGE_LIST_MISSING, "Solaris pkg-list packages");
    
    if (empty_or_null(egrep(string:pkg_list, pattern:"^apache-"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "apache");
    
    flag = 0;
    
    if (solaris_check_release(release:"0.5.11-0.175.2.2.0.5.0", sru:"SRU 11.2.2.5.0") > 0) flag++;
    
    if (flag)
    {
      error_extra = 'Affected package : apache\n' + solaris_get_report2();
      error_extra = ereg_replace(pattern:"version", replace:"OS version", string:error_extra);
      if (report_verbosity > 0) security_warning(port:0, extra:error_extra);
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_PACKAGE_NOT_AFFECTED, "apache");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-0921.NASL
    descriptionUpdated httpd packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the
    last seen2020-06-01
    modified2020-06-02
    plugin id76905
    published2014-07-30
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/76905
    titleRHEL 7 : httpd (RHSA-2014:0921)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2014:0921. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(76905);
      script_version("1.22");
      script_cvs_date("Date: 2019/10/24 15:35:38");
    
      script_cve_id("CVE-2013-4352", "CVE-2014-0117", "CVE-2014-0118", "CVE-2014-0226", "CVE-2014-0231");
      script_xref(name:"RHSA", value:"2014:0921");
    
      script_name(english:"RHEL 7 : httpd (RHSA-2014:0921)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated httpd packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 7.
    
    The Red Hat Security Response Team has rated this update as having
    Important security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    The httpd packages provide the Apache HTTP Server, a powerful,
    efficient, and extensible web server.
    
    A race condition flaw, leading to heap-based buffer overflows, was
    found in the mod_status httpd module. A remote attacker able to access
    a status page served by mod_status on a server using a threaded
    Multi-Processing Module (MPM) could send a specially crafted request
    that would cause the httpd child process to crash or, possibly, allow
    the attacker to execute arbitrary code with the privileges of the
    'apache' user. (CVE-2014-0226)
    
    A NULL pointer dereference flaw was found in the mod_cache httpd
    module. A malicious HTTP server could cause the httpd child process to
    crash when the Apache HTTP Server was used as a forward proxy with
    caching. (CVE-2013-4352)
    
    A denial of service flaw was found in the mod_proxy httpd module. A
    remote attacker could send a specially crafted request to a server
    configured as a reverse proxy using a threaded Multi-Processing
    Modules (MPM) that would cause the httpd child process to crash.
    (CVE-2014-0117)
    
    A denial of service flaw was found in the way httpd's mod_deflate
    module handled request body decompression (configured via the
    'DEFLATE' input filter). A remote attacker able to send a request
    whose body would be decompressed could use this flaw to consume an
    excessive amount of system memory and CPU on the target system.
    (CVE-2014-0118)
    
    A denial of service flaw was found in the way httpd's mod_cgid module
    executed CGI scripts that did not read data from the standard input. A
    remote attacker could submit a specially crafted request that would
    cause the httpd child process to hang indefinitely. (CVE-2014-0231)
    
    All httpd users are advised to upgrade to these updated packages,
    which contain backported patches to correct these issues. After
    installing the updated packages, the httpd daemon will be restarted
    automatically."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2014:0921"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-0231"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-0118"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-0117"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-0226"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-4352"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:httpd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:httpd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:httpd-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:httpd-manual");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:httpd-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mod_ldap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mod_proxy_html");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mod_session");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mod_ssl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.3");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/07/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/07/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/07/30");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2014:0921";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"httpd-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"httpd-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"httpd-debuginfo-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"httpd-debuginfo-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"httpd-devel-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"httpd-devel-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"httpd-manual-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"httpd-tools-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"httpd-tools-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"mod_ldap-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"mod_ldap-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"mod_proxy_html-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"mod_proxy_html-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"mod_session-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"mod_session-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"mod_ssl-2.4.6-18.el7_0")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"mod_ssl-2.4.6-18.el7_0")) flag++;
    
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "httpd / httpd-debuginfo / httpd-devel / httpd-manual / httpd-tools / etc");
      }
    }
    
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1419.NASL
    descriptionAccording to the versions of the httpd packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.(CVE-2014-0098) - A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the
    last seen2020-06-01
    modified2020-06-02
    plugin id124922
    published2019-05-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124922
    titleEulerOS Virtualization 3.0.1.0 : httpd (EulerOS-SA-2019-1419)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(124922);
      script_version("1.5");
      script_cvs_date("Date: 2020/01/17");
    
      script_cve_id(
        "CVE-2013-4352",
        "CVE-2013-5704",
        "CVE-2013-6438",
        "CVE-2014-0098",
        "CVE-2014-0117",
        "CVE-2014-0118",
        "CVE-2014-0226",
        "CVE-2014-0231",
        "CVE-2014-3581",
        "CVE-2015-3183",
        "CVE-2015-3185",
        "CVE-2016-0736",
        "CVE-2016-2161",
        "CVE-2016-5387",
        "CVE-2016-8743",
        "CVE-2017-15710",
        "CVE-2017-3167",
        "CVE-2017-3169",
        "CVE-2017-7668",
        "CVE-2017-7679",
        "CVE-2017-9788",
        "CVE-2017-9798",
        "CVE-2018-1303",
        "CVE-2018-1312",
        "CVE-2019-0217"
      );
      script_bugtraq_id(
        66303,
        66550,
        68678,
        68740,
        68742,
        68745,
        68863,
        69248,
        71656,
        75963,
        75965
      );
    
      script_name(english:"EulerOS Virtualization 3.0.1.0 : httpd (EulerOS-SA-2019-1419)");
      script_summary(english:"Checks the rpm output for the updated packages.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote EulerOS Virtualization host is missing multiple security
    updates.");
      script_set_attribute(attribute:"description", value:
    "According to the versions of the httpd packages installed, the
    EulerOS Virtualization installation on the remote host is affected by
    the following vulnerabilities :
    
      - The log_cookie function in mod_log_config.c in the
        mod_log_config module in the Apache HTTP Server before
        2.4.8 allows remote attackers to cause a denial of
        service (segmentation fault and daemon crash) via a
        crafted cookie that is not properly handled during
        truncation.(CVE-2014-0098)
    
      - A race condition flaw, leading to heap-based buffer
        overflows, was found in the mod_status httpd module. A
        remote attacker able to access a status page served by
        mod_status on a server using a threaded
        Multi-Processing Module (MPM) could send a specially
        crafted request that would cause the httpd child
        process to crash or, possibly, allow the attacker to
        execute arbitrary code with the privileges of the
        'apache' user.(CVE-2014-0226)
    
      - It was discovered that the HTTP parser in httpd
        incorrectly allowed certain characters not permitted by
        the HTTP protocol specification to appear unencoded in
        HTTP request headers. If httpd was used in conjunction
        with a proxy or backend server that interpreted those
        characters differently, a remote attacker could
        possibly use this flaw to inject data into HTTP
        responses, resulting in proxy cache
        poisoning.(CVE-2016-8743)
    
      - A NULL pointer dereference flaw was found in the way
        the mod_cache httpd module handled Content-Type
        headers. A malicious HTTP server could cause the httpd
        child process to crash when the Apache HTTP server was
        configured to proxy to a server with caching
        enabled.(CVE-2014-3581)
    
      - Multiple flaws were found in the way httpd parsed HTTP
        requests and responses using chunked transfer encoding.
        A remote attacker could use these flaws to create a
        specially crafted request, which httpd would decode
        differently from an HTTP proxy software in front of it,
        possibly leading to HTTP request smuggling
        attacks.(CVE-2015-3183)
    
      - In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and
        2.4.0 to 2.4.29, mod_authnz_ldap, if configured with
        AuthLDAPCharsetConfig, uses the Accept-Language header
        value to lookup the right charset encoding when
        verifying the user's credentials. If the header value
        is not present in the charset conversion table, a
        fallback mechanism is used to truncate it to a two
        characters value to allow a quick retry (for example,
        'en-US' is truncated to 'en'). A header value of less
        than two characters forces an out of bound write of one
        NUL byte to a memory location that is not part of the
        string. In the worst case, quite unlikely, the process
        would crash which could be used as a Denial of Service
        attack. In the more likely case, this memory is already
        reserved for future use and the issue has no effect at
        all.(CVE-2017-15710)
    
      - A NULL pointer dereference flaw was found in the
        httpd's mod_ssl module. A remote attacker could use
        this flaw to cause an httpd child process to crash if
        another module used by httpd called a certain API
        function during the processing of an HTTPS
        request.(CVE-2017-3169)
    
      - It was discovered that httpd used the value of the
        Proxy header from HTTP requests to initialize the
        HTTP_PROXY environment variable for CGI scripts, which
        in turn was incorrectly used by certain HTTP client
        implementations to configure the proxy for outgoing
        HTTP requests. A remote attacker could possibly use
        this flaw to redirect HTTP requests performed by a CGI
        script to an attacker-controlled proxy via a malicious
        HTTP request.(CVE-2016-5387)
    
      - A buffer over-read flaw was found in the httpd's
        mod_mime module. A user permitted to modify httpd's
        MIME configuration could use this flaw to cause httpd
        child process to crash.(CVE-2017-7679)
    
      - A specially crafted HTTP request header could have
        crashed the Apache HTTP Server prior to version 2.4.30
        due to an out of bound read while preparing data to be
        cached in shared memory. It could be used as a Denial
        of Service attack against users of mod_cache_socache.
        The vulnerability is considered as low risk since
        mod_cache_socache is not widely used, mod_cache_disk is
        not concerned by this vulnerability.(CVE-2018-1303)
    
      - It was discovered that the httpd's mod_auth_digest
        module did not properly initialize memory before using
        it when processing certain headers related to digest
        authentication. A remote attacker could possibly use
        this flaw to disclose potentially sensitive information
        or cause httpd child process to crash by sending
        specially crafted requests to a server.(CVE-2017-9788)
    
      - A flaw was found in the way httpd handled HTTP Trailer
        headers when processing requests using chunked
        encoding. A malicious client could use Trailer headers
        to set additional HTTP headers after header processing
        was performed by other modules. This could, for
        example, lead to a bypass of header restrictions
        defined with mod_headers.(CVE-2013-5704)
    
      - A buffer over-read flaw was found in the httpd's
        ap_find_token() function. A remote attacker could use
        this flaw to cause httpd child process to crash via a
        specially crafted HTTP request.(CVE-2017-7668)
    
      - A race condition was found in mod_auth_digest when the
        web server was running in a threaded MPM configuration.
        It could allow a user with valid credentials to
        authenticate using another username, bypassing
        configured access control restrictions.(CVE-2019-0217)
    
      - A NULL pointer dereference flaw was found in the
        mod_cache httpd module. A malicious HTTP server could
        cause the httpd child process to crash when the Apache
        HTTP Server was used as a forward proxy with caching.
        (CVE-2013-4352)
    
      - he dav_xml_get_cdata function in main/util.c in the
        mod_dav module in the Apache HTTP Server before 2.4.8
        does not properly remove whitespace characters from
        CDATA sections, which allows remote attackers to cause
        a denial of service (daemon crash) via a crafted DAV
        WRITE request. (CVE-2013-6438)
    
      - A denial of service flaw was found in the mod_proxy
        httpd module. A remote attacker could send a specially
        crafted request to a server configured as a reverse
        proxy using a threaded Multi-Processing Modules (MPM)
        that would cause the httpd child process to crash.
        (CVE-2014-0117)
    
      - A denial of service flaw was found in the way httpd's
        mod_deflate module handled request body decompression
        (configured via the 'DEFLATE' input filter). A remote
        attacker able to send a request whose body would be
        decompressed could use this flaw to consume an
        excessive amount of system memory and CPU on the target
        system.(CVE-2014-0118)
    
      - A denial of service flaw was found in the way httpd's
        mod_cgid module executed CGI scripts that did not read
        data from the standard input. A remote attacker could
        submit a specially crafted request that would cause the
        httpd child process to hang
        indefinitely.(CVE-2014-0231)
    
      - It was discovered that in httpd 2.4, the internal API
        function ap_some_auth_required() could incorrectly
        indicate that a request was authenticated even when no
        authentication was used. An httpd module using this API
        function could consequently allow access that should
        have been denied. (CVE-2015-3185)
    
      - It was discovered that the mod_session_crypto module of
        httpd did not use any mechanisms to verify integrity of
        the encrypted session data stored in the user's
        browser. A remote attacker could use this flaw to
        decrypt and modify session data using a padding oracle
        attack. (CVE-2016-0736)
    
      - It was discovered that the mod_auth_digest module of
        httpd did not properly check for memory allocation
        failures. A remote attacker could use this flaw to
        cause httpd child processes to repeatedly crash if the
        server used HTTP digest authentication.(CVE-2016-2161)
    
      - It was discovered that the use of httpd's
        ap_get_basic_auth_pw() API function outside of the
        authentication phase could lead to authentication
        bypass. A remote attacker could possibly use this flaw
        to bypass required authentication if the API was used
        incorrectly by one of the modules used by
        httpd.(CVE-2017-3167)
    
      - A use-after-free flaw was found in the way httpd
        handled invalid and previously unregistered HTTP
        methods specified in the Limit directive used in an
        .htaccess file. A remote attacker could possibly use
        this flaw to disclose portions of the server memory, or
        cause httpd child process to crash. (CVE-2017-9798)
    
      - In Apache httpd 2.2.0 to 2.4.29, when generating an
        HTTP Digest authentication challenge, the nonce sent to
        prevent reply attacks was not correctly generated using
        a pseudo-random seed. In a cluster of servers using a
        common Digest authentication configuration, HTTP
        requests could be replayed across servers by an
        attacker without detection. (CVE-2018-1312)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the EulerOS security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues.");
      # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1419
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4b195f8e");
      script_set_attribute(attribute:"solution", value:
    "Update the affected httpd packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2019/05/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/14");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:httpd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:httpd-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:mod_ssl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.1.0");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Huawei Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/EulerOS/release");
    if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
    uvp = get_kb_item("Host/EulerOS/uvp_version");
    if (uvp != "3.0.1.0") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.1.0");
    if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
    
    flag = 0;
    
    pkgs = ["httpd-2.4.6-80.1.h6",
            "httpd-tools-2.4.6-80.1.h6",
            "mod_ssl-2.4.6-80.1.h6"];
    
    foreach (pkg in pkgs)
      if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "httpd");
    }
    

Redhat

rpms
  • httpd-0:2.4.6-18.el7_0
  • httpd-debuginfo-0:2.4.6-18.el7_0
  • httpd-devel-0:2.4.6-18.el7_0
  • httpd-manual-0:2.4.6-18.el7_0
  • httpd-tools-0:2.4.6-18.el7_0
  • mod_ldap-0:2.4.6-18.el7_0
  • mod_proxy_html-1:2.4.6-18.el7_0
  • mod_session-0:2.4.6-18.el7_0
  • mod_ssl-1:2.4.6-18.el7_0
  • httpd24-httpd-0:2.4.6-18.el6
  • httpd24-httpd-0:2.4.6-21.el7
  • httpd24-httpd-debuginfo-0:2.4.6-18.el6
  • httpd24-httpd-debuginfo-0:2.4.6-21.el7
  • httpd24-httpd-devel-0:2.4.6-18.el6
  • httpd24-httpd-devel-0:2.4.6-21.el7
  • httpd24-httpd-manual-0:2.4.6-18.el6
  • httpd24-httpd-manual-0:2.4.6-21.el7
  • httpd24-httpd-tools-0:2.4.6-18.el6
  • httpd24-httpd-tools-0:2.4.6-21.el7
  • httpd24-mod_ldap-0:2.4.6-18.el6
  • httpd24-mod_ldap-0:2.4.6-21.el7
  • httpd24-mod_proxy_html-1:2.4.6-18.el6
  • httpd24-mod_proxy_html-1:2.4.6-21.el7
  • httpd24-mod_session-0:2.4.6-18.el6
  • httpd24-mod_session-0:2.4.6-21.el7
  • httpd24-mod_ssl-1:2.4.6-18.el6
  • httpd24-mod_ssl-1:2.4.6-21.el7

References