Описание
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-12171
- https://access.redhat.com/errata/RHSA-2017:2972
- https://access.redhat.com/security/cve/CVE-2017-12171
- https://bugzilla.redhat.com/show_bug.cgi?id=1493056
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12171
- http://www.securityfocus.com/bid/101516
- http://www.securitytracker.com/id/1039633
Связанные уязвимости
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
A regression was found in the Red Hat Enterprise Linux 6.9 version of ...
Уязвимость HTTP-сервера Apache, связанная с использованием памяти после ее освобождения, позволяющая нарушителю раскрыть части памяти сервера, вызвать сбой дочернего процесса httpd или получить доступ к закрытым HTTP-ресурсам