Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.55769
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2005:200 (apache-mod_auth_shadow)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to apache-mod_auth_shadow
announced via advisory MDKSA-2005:200.

The mod_auth_shadow module 1.0 through 1.5 and 2.0 for Apache with
AuthShadow enabled uses shadow authentication for all locations that
use the require group directive, even when other authentication
mechanisms are specified, which might allow remote authenticated users
to bypass security restrictions.

This update requires an explicit AuthShadow on statement if website
authentication should be checked against /etc/shadow.

The updated packages have been patched to address this issue.

Affected: 10.1, 10.2, 2006.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2005:200

Risk factor : High

CVSS Score:
7.5

Referencia Cruzada: BugTraq ID: 15224
Common Vulnerability Exposure (CVE) ID: CVE-2005-2963
http://www.securityfocus.com/bid/15224
Debian Security Information: DSA-844 (Google Search)
http://www.debian.org/security/2005/dsa-844
http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:200
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=323789
http://www.osvdb.org/19863
http://secunia.com/advisories/17060/
http://secunia.com/advisories/17067
http://secunia.com/advisories/17348
XForce ISS Database: modauthshadow-require-group-bypass-security(22520)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22520
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.