HTTP (WWW server) port active

Risk Level: High risk vulnerability  High

Check or Attack Name: httpd

Platforms: NCSA Servers: Old
Description:

An NCSA V1.3 httpd web server or earlier version was detected. These versions of NCSA allow attackers to remotely execute commands.

Remedy:

Unix: Update to the newest version of httpd. Make sure httpd is configured to run as nobody instead of root. If possible, chroot http to a restricted file area.

References:

CERT Advisory CA-95.04, NCSA HTTP Daemon for UNIX Vulnerability, http://www.cert.org/advisories/CA-95.04.NCSA.http.daemon.for.unix.vulnerability.html


X-Force Logo
Know Your Risks