Vulnerability   
Search   
    Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2018.3970.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2018:3970-1)
Summary:The remote host is missing an update for the 'apache2-mod_jk' package(s) announced via the SUSE-SU-2018:3970-1 advisory.
Description:Summary:
The remote host is missing an update for the 'apache2-mod_jk' package(s) announced via the SUSE-SU-2018:3970-1 advisory.

Vulnerability Insight:
This update for apache2-mod_jk fixes the following issues:

Security issues fixed:
CVE-2018-11759: Fixed connector path traversal due to mishandled HTTP
requests in httpd (bsc#1114612).

CVE-2014-8111: Apache Tomcat Connectors (mod_jk) ignored JkUnmount rules
for subtrees of previous JkMount rules, which allowed remote attackers
to access otherwise restricted artifacts via unspecified vectors
(bsc#927845).

Affected Software/OS:
'apache2-mod_jk' package(s) on SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Debuginfo 11-SP4

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-8111
BugTraq ID: 74265
http://www.securityfocus.com/bid/74265
Debian Security Information: DSA-3278 (Google Search)
http://www.debian.org/security/2015/dsa-3278
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c@%3Cdev.tomcat.apache.org%3E
RedHat Security Advisories: RHSA-2015:0846
http://rhn.redhat.com/errata/RHSA-2015-0846.html
RedHat Security Advisories: RHSA-2015:0847
http://rhn.redhat.com/errata/RHSA-2015-0847.html
RedHat Security Advisories: RHSA-2015:0848
http://rhn.redhat.com/errata/RHSA-2015-0848.html
RedHat Security Advisories: RHSA-2015:0849
http://rhn.redhat.com/errata/RHSA-2015-0849.html
RedHat Security Advisories: RHSA-2015:1641
http://rhn.redhat.com/errata/RHSA-2015-1641.html
RedHat Security Advisories: RHSA-2015:1642
http://rhn.redhat.com/errata/RHSA-2015-1642.html
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.