The target is running an Apache web server which allows for the injection of arbitrary escape sequences into its error logs. An attacker might use this vulnerability in an attempt to exploit similar vulnerabilities in terminal emulators. ***** OVS has determined the vulnerability exists only by looking at ***** the Server header returned by the web server running on the target.
Upgrade to Apache version 1.3.31 or 2.0.49 or newer.
- Asterisk SIP Response Username Enumeration Remote Information Disclosure Vulnerability
- Adobe Reader Multiple Vulnerabilities - Aug07 (Windows)
- Apple Mac OS X Authentication Bypass Vulnerability
- Active Perl CGI.pm 'Set-Cookie' and 'P3P' HTTP Header Injection Vulnerability (Win)