Hey all,

I just want to shed a light on my current status.

I had started writing a "White Paper" on openVAS. I would like to receive as 
much as inputs from your side. Please co-opereate with me for the better 
outcome which will be very helpful from all of you.

Waiting for the earliest response.

Best Regards, 
Avinash V.Bhat| Nokia Siemens Networks | SPA2 |( +91 (80) 4363 2091(Direct) | ( 
(858) 2091(VOIP) | y : [email protected] 


-----Original Message-----
From: [email protected] 
[mailto:[email protected]] On Behalf Of ext Kaushal 
Shriyan
Sent: Monday, September 13, 2010 11:26 AM
To: [email protected]
Subject: [Openvas-discuss] openvas scanner

Hi

I have ran openvas scanner on one of the client host. The report
suggests Apache versions prior to 2.2.15-dev are affected. I had a
word with Ubuntu Security Team, "Your OpenVAS scan is a false alert,
as it's relying on the version number" Please suggest/guide.

Thanks and Regards

Kaushal

Overview:
Apache is prone to multiple vulnerabilities.

These issues may lead to information disclosure or other attacks.

Apache versions prior to 2.2.15-dev are affected.

Solution:
These issues have been addressed in Apache 2.2.15-dev. Apache 2.2.15
including fixes will become available in the future as well. Please
see the references for more information.

References:
http://www.securityfocus.com/bid/38494
http://httpd.apache.org/security/vulnerabilities_22.html
http://httpd.apache.org/
https://issues.apache.org/bugzilla/show_bug.cgi?id=48359
http://svn.apache.org/viewvc?view=revision&revision=917870

Risk factor : Medium
CVE : CVE-2010-0425, CVE-2010-0434, CVE-2010-0408
BID : 38494, 38491
OID : 1.3.6.1.4.1.25623.1.0.100514

        Overview:
Apache HTTP Server is prone to multiple remote denial-of-service
vulnerabilities.

An attacker can exploit these issues to deny service to
legitimate users.

Versions prior to Apache 2.2.16 are vulnerable.

Solution:
These issues have been fixed in Apache 2.2.16. Please see the
references for more information.

References:
https://www.securityfocus.com/bid/41963
http://httpd.apache.org/download.cgi
http://httpd.apache.org/
http://www.apache.org/dist/httpd/Announcement2.2.html
http://www.apache.org/dist/httpd/CHANGES_2.2.16
CVE : CVE-2010-1452
BID : 41963
OID : 1.3.6.1.4.1.25623.1.0.100725

        

Overview:
This host is running Apache HTTP Server and is prone to Denial of Service
vulnerability.

Vulnerability Insight:
The flaw is due to error in 'stream_reqbody_cl' function in 'mod_proxy_http.c'
in the mod_proxy module. When a reverse proxy is configured, it does
not properly
handle an amount of streamed data that exceeds the Content-Length value via
crafted requests.

Impact:
Successful exploitation will allow remote attackers to cause Denial of Service
to the legitimate user by CPU consumption.

Impact Level: Application

Affected Software/OS:
Apache HTTP Server version prior to 2.3.3

Fix:
Fixed in the SVN repository.
http://svn.apache.org/viewvc?view=rev&revision=790587

References:
http://secunia.com/advisories/35691
http://www.vupen.com/english/advisories/2009/1773
http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=790587&r2=790586&pathrev=790587

CVSS Score:
CVSS Base Score : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
CVSS Temporal Score : 3.7
Risk factor : Medium
CVE : CVE-2009-1890
BID : 35565
OID : 1.3.6.1.4.1.25623.1.0.800827
_______________________________________________
Openvas-discuss mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
_______________________________________________
Openvas-discuss mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss

Reply via email to