Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2006-20001

Опубликовано: 17 янв. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.

A flaw was found in the mod_dav module of httpd. A specially crafted "If:" request header can cause a memory read or write of a single zero byte due to a missing error check, resulting in a Denial of Service.

Отчет

This flaw only affects configurations with mod_dav loaded and configured. Also, if there is no WebDAV repository configured, the server is not affected and no further mitigation is needed. For more information about the mitigation, check the mitigation section below. The httpd mod_dav module is enabled by default on Red Hat Enterprise Linux 6, 7, 8, 9, and in RHSCL. However, there is no WebDAV repository configured by default. This flaw has been rated as having a security impact of moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.

Меры по смягчению последствий

Disabling mod_dav and restarting httpd will mitigate this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdOut of support scope
Red Hat Enterprise Linux 7httpdOut of support scope
Red Hat JBoss Enterprise Application Platform 6httpd22Out of support scope
Red Hat Software Collectionshttpd24-httpdWill not fix
JBCS httpd 2.4.51.sp2httpdFixedRHSA-2023:335505.06.2023
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2023:335405.06.2023
JBoss Core Services on RHEL 7jbcs-httpd24-httpdFixedRHSA-2023:335405.06.2023
Red Hat Enterprise Linux 8httpdFixedRHSA-2023:085221.02.2023
Red Hat Enterprise Linux 9httpdFixedRHSA-2023:097028.02.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2161774httpd: mod_dav: out-of-bounds read/write of zero byte

EPSS

Процентиль: 73%
0.00753
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 3 лет назад

A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.

CVSS3: 7.5
nvd
около 3 лет назад

A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.

CVSS3: 7.5
debian
около 3 лет назад

A carefully crafted If: request header can cause a memory read, or wri ...

CVSS3: 7.5
github
около 3 лет назад

A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.

CVSS3: 7.5
fstec
больше 19 лет назад

Уязвимость модуля mod_dav веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 73%
0.00753
Низкий

7.5 High

CVSS3