Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-9788

Опубликовано: 11 июл. 2017
Источник: redhat
CVSS3: 4.8
EPSS Средний

Описание

In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.

It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.

Меры по смягчению последствий

If you do not use digest authentication, do not load the "auth_digest_module". For example, on RHEL 7, this can be done by commenting out or removing the "LoadModule auth_digest_module modules/mod_auth_digest.so" line within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service. You can then use the "httpd -t -D DUMP_MODULES" command to verify that the module is no longer loaded.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5httpdWill not fix
Red Hat JBoss Enterprise Application Platform 5httpdNot affected
Red Hat JBoss Enterprise Web Server 3httpdFix deferred
JBoss Core Services on RHEL 6jbcs-httpd24-httpdFixedRHSA-2017:271013.09.2017
JBoss Core Services on RHEL 6jbcs-httpd24-opensslFixedRHSA-2017:271013.09.2017
JBoss Core Services on RHEL 7jbcs-httpd24-httpdFixedRHSA-2017:270913.09.2017
JBoss Core Services on RHEL 7jbcs-httpd24-opensslFixedRHSA-2017:270913.09.2017
Red Hat Enterprise Linux 6httpdFixedRHSA-2017:247815.08.2017
Red Hat Enterprise Linux 6.7 Extended Update SupporthttpdFixedRHSA-2017:319513.11.2017
Red Hat Enterprise Linux 7httpdFixedRHSA-2017:247915.08.2017

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-456
https://bugzilla.redhat.com/show_bug.cgi?id=1470748httpd: Uninitialized memory reflection in mod_auth_digest

EPSS

Процентиль: 98%
0.52641
Средний

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
больше 8 лет назад

In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.

CVSS3: 9.1
nvd
больше 8 лет назад

In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.

CVSS3: 9.1
debian
больше 8 лет назад

In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value place ...

suse-cvrf
больше 8 лет назад

Security update for apache2

suse-cvrf
больше 8 лет назад

Security update for apache2

EPSS

Процентиль: 98%
0.52641
Средний

4.8 Medium

CVSS3