HTTP (WWW server) port active |
---|
Risk Level: | High | Check or Attack Name: httpd |
---|---|---|
Platforms: | NCSA Servers: Old | |
Description: | An NCSA V1.3 httpd web server or earlier version was detected. These versions of NCSA allow attackers to remotely execute commands. |
|
Remedy: | Unix: Update to the newest version of httpd. Make sure httpd is configured to run as nobody instead of root. If possible, chroot http to a restricted file area. |
|
References: | CERT Advisory CA-95.04, NCSA HTTP Daemon for UNIX Vulnerability, http://www.cert.org/advisories/CA-95.04.NCSA.http.daemon.for.unix.vulnerability.html |
Know Your Risks |