{"vuid":"VU#927256","idnumber":"927256","name":"MandrakeSoft Mandrake Linux Apache default configuration enables Perl ProxyPass server on 8200/tcp","keywords":["Linux-Mandrake","Apache","perl","proxy","8200/tcp","apache-mod_perl","ProxyPass"],"overview":"The default installation of Apache on MandrakeSoft Mandrake Linux configures an instance of the server to run apache-mod_perl listening on port 8200/tcp.","clean_desc":"MandrakeSoft produces a Linux distribution called Mandrake Linux that includes the Apache web server. The default installation of Apache on Mandrake Linux configures apache-mod_perl to listen on port 8200/tcp. Requests made to the main web server for directories containing Perl programs are proxied internally by Apache to the apache-mod_perl service running on port 8200/tcp. This configuration is called ProxyPass as referenced in Apache's mod_perl performance tuning document. Although all Apache servers on a system share configuration information contained in /etc/httpd/conf/commonhttpd.conf, it is possible that security settings between the two servers are different, and administrators may not expect apache-mod_perl running on port 8200/tcp","impact":"Administrators may not be aware that an HTTPD service is listening on 8200/tcp. Also, it is possible that the security settings for the service on 8200/tcp differ from the service running on 80/tcp.","resolution":"Install Updated Package\nInstall an updated Apache package when available.","workarounds":"Disable Server\nDisable the server on 8200/tcp. Block or Restrict Access\nBlock or restrict access to port 8200/tcp.","sysaffected":"","thanks":"The CERT Coordination Center thanks \nProCheckup Ltd\n for reporting this vulnerability.","author":"This document was written by Art Manion.","public":["http://www.procheckup.com/vuln.html","http://perl.apache.org/tuning/#USING_ProxyPass_WITH_TWO_SERVERS"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-08-03T21:58:18Z","publicdate":"2001-11-20T00:00:00Z","datefirstpublished":"2001-11-21T16:39:38Z","dateupdated":"2002-05-28T21:49:55Z","revision":19,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"7","cam_impact":"4","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"0.21","cam_scorecurrentwidelyknown":"4.2","cam_scorecurrentwidelyknownexploited":"8.4","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.21,"vulnote":null}