Revision Date: | 2013-04-29 | Version: | 11 | Title: | mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference. | Description: | mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference. | Family: | unix | Class: | vulnerability | Status: | ACCEPTED | Reference(s): | CVE-2005-3357
| Platform(s): | CentOS Linux 3 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4
| Product(s): | | Definition Synopsis | OS Section: RHEL3, CentOS3 RHEL3 or CentOS3
The operating system installed on the system is Red Hat Enterprise Linux 3
OR CentOS Linux 3.x
AND Configuration section
httpd-devel is earlier than 0:2.0.46-56.ent
OR mod_ssl is earlier than 1:2.0.46-56.ent
OR httpd is earlier than 0:2.0.46-56.ent
OR OS Section: RHEL4, CentOS4, Oracle Linux 4
RHEL4, CentOS4 or Oracle Linux 4
The operating system installed on the system is Red Hat Enterprise Linux 4
OR CentOS Linux 4.x
OR Oracle Linux 4.x
AND Configuration section
httpd-suexec is earlier than 0:2.0.52-22.ent
OR httpd-manual is earlier than 0:2.0.52-22.ent
OR httpd-devel is earlier than 0:2.0.52-22.ent
OR mod_ssl is earlier than 1:2.0.52-22.ent
OR httpd is earlier than 0:2.0.52-22.ent
|
|