interfasys
Verified User
Apache 1.3.32 and php 4.3.9 needed (when available)!
Vulnerability https (443/tcp)
The remote host appears to be running a version of Apache which is older
than 1.3.32.
There is a local buffer overflow in htpasswd command in this version,
which may allow a local user to gain the privileges of the httpd process.
See also : http://xforce.iss.net/xforce/xfdb/17413
Solution : Upgrade to Apache 1.3.32 when available
Risk factor : High
Nessus ID : 14771
////////////////////////////
The remote host is running a version of PHP which is
older than 4.3.9 or 5.0.2.
The remote version of this software is affected by an unspecified file
upload vulnerability which may allow an attacker to upload arbitrary
files to the remote server.
See also : http://viewcvs.php.net/viewcvs.cgi/php-src/NEWS.diff?r1=1.1247.2.724&r2=1.1247.2.726
Solution : Upgrade to PHP 4.3.9 or 5.0.2 when available
Risk factor : Medium
BID : 11190
Nessus ID : 14770
Vulnerability https (443/tcp)
The remote host appears to be running a version of Apache which is older
than 1.3.32.
There is a local buffer overflow in htpasswd command in this version,
which may allow a local user to gain the privileges of the httpd process.
See also : http://xforce.iss.net/xforce/xfdb/17413
Solution : Upgrade to Apache 1.3.32 when available
Risk factor : High
Nessus ID : 14771
////////////////////////////
The remote host is running a version of PHP which is
older than 4.3.9 or 5.0.2.
The remote version of this software is affected by an unspecified file
upload vulnerability which may allow an attacker to upload arbitrary
files to the remote server.
See also : http://viewcvs.php.net/viewcvs.cgi/php-src/NEWS.diff?r1=1.1247.2.724&r2=1.1247.2.726
Solution : Upgrade to PHP 4.3.9 or 5.0.2 when available
Risk factor : Medium
BID : 11190
Nessus ID : 14770
Last edited: