2015-10-23 68 views
-2

我们正在使用当前版本的Apache 2.4。 6可用于Centos 7回购。装有yum。PCI合规性apache版本

,我们正在处理的PCI法规遵从和报告说:

IP Address: x 
Host: x 
Path: 

THREAT REFERENCE 

Summary: 
vulnerable Apache version: 2.4.6 

Risk: High (3) 
Port: 443/tcp 
Protocol: tcp 
Threat ID: web_server_apache_version 

Details: Apache HTTP Server mod_proxy_fcgi Response Handling Vulnerability 
11/21/14 
CVE 2014-3583 
Apache HTTP Server before 2.4.11 is prone to a vulnerability, 
which can be exploited to cause a DoS (Denial of Service). 
The vulnerability exists due to an overflow condition in mod_proxy_fcgi. 
when handling responses from FastCGI servers. The vulnerability can be exploited by 
sending a crafted response from a malicious FastCGI server, which could lead to a 
crash when reading past the end of a heap memory. 
Apache HTTP Server NULL Pointer Dereference Vulnerability 
10/08/14 
CVE 2014-3581 
Apache HTTP Server 2.4.10 and earlier is prone to a vulnerability, 
which can be exploited to cause a DoS (Denial of Service). 
The vulnerability exists because the application contains flaw in 
the cache_merge_headers_out() function which is 
triggered when handling an empty 'Content-Type' header value. 
Multiple Vulnerabilities Fixed in Apache HTTP Server 2.4.10 
07/24/14 
CVE 2014-0117 
CVE 2014-0118 
CVE 2014-0226 
CVE 2014-0231 
CVE 2014-3523 
Apache HTTP Server before 2.4.10 is prone to multiple vulnerabilities, 
which can be exploited to cause a DoS (Denial of Service). 
The vulnerabilities exist because the application contains flaw in 
mod_proxy, mod_deflate, mod_status, and mod_cgid modules and 
in the winnt_accept function of WinNT MPM. 
Note: the WinNT MPM denial of service vulnerability can only 
be exploited when the default AcceptFilter is used. 
Apache HTTP Server Two Denial of Service Vulnerabilities 
03/19/14 
CVE 2013-6438 
CVE 2014-0098 
Apache HTTP Server before 2.4.9 is prone to two vulnerabilities, 
which can be exploited to cause a DoS (Denial of Service). 
The first vulnerability exists due to an error in the mod_log_config module when logging 
with truncated cookies. The second vulnerability is due to a boundary error in the mod_dav 
module when removing leading spaces. 
HTTP-Basic Authentication Bypass Vulnerability 
08/14/09 
Apache 2.2.2 and prior are prone to an authentication-bypass vulnerability 
because it fails to properly enforce access restrictions on certain requests to a site that requires authentication. 
An attacker can exploit this issue to gain access to protected resources, 
which may allow the attacker to obtain sensitive information or launch further attacks. 
Apache HTTP Server OS Fingerprinting Unspecified Security Vulnerability 
11/03/08 
Apache 2.2.9 and prior is prone an unspecified security vulnerability. 

Information From Target: 
Service: https 
Received: Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips PHP/5.6.13 

我们更新周“百胜更新”

一旦服务器,但是当我做的:RPM -q --changelog httpd | grep的CVE我可以看到这一点:

  • 芯:修复块头部解析缺陷(CVE-2015-3183) 和ap_force_authn钩(CVE-2015-3185)
  • 芯:mod_headers中的规则修复旁路通过分块请求(CVE-2013-5704)
  • mod_cache的:在空的Content-Type固定空指针引用(CVE-2014-3581)
  • mod_cgid:添加安全修复了CVE-2014-0231(#1120608)
  • mod_proxy:为CVE-2014-0117添加安全修复程序(#1120608)
  • mod_deflate模块:添加安全修复了CVE-2014-0118(#1120608)
  • mod_status的:增加安全修复了CVE-2014-0226(#1120608)
  • mod_cache的:添加secutiry修复了CVE-2013-4352(# 1120608)
  • 的mod_dav:添加安全修复了CVE-2013-6438(#1077907)
  • mod_log_config:添加安全修复了CVE-2014-0098(#1077907)

我怎样才能应用补丁安全扫描是要求? 我无法找到rpms来执行此操作。

+0

询问服务器错误:https://serverfault.com/或超级用户:https://superuser.com/ –

+0

是的,他们接受changelog输出,但我仍然不明白为什么,因为并非所有CVE他们要求,正在更新日志中。 – David

回答

0

Redhat backports他们的补丁,因此你可能已经补丁了apache,但它仍然会显示旧版本。拿起更新日志并将其作为误报的证据提交给QSA,他们应该接受它并关闭漏洞。