Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:2756-1

Опубликовано: 18 окт. 2017
Источник: suse-cvrf

Описание

Security update for apache2

This update for apache2 fixes several issues.

These security issues were fixed:

  • CVE-2017-9798: Prevent use-after-free use of memory that allowed for an information leak via OPTIONS (bsc#1058058)
  • CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest could have lead to leakage of potentially confidential information, and a segfault in other cases resulting in DoS (bsc#1048576).
  • CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type response header (bsc#1045060).
  • CVE-2017-3169: mod_ssl may dereferenced a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS (bsc#1045062).
  • CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have lead to authentication requirements being bypassed (bsc#1045065).

These non-security issues were fixed:

  • remove /usr/bin/http2 symlink only during apache2 package uninstall, not upgrade (bsc#1041830)
  • gensslcert: use hostname when fqdn is too long (bsc#1035829)
  • add NotifyAccess=all to service file (bsc#980663)

Список пакетов

SUSE Linux Enterprise Server 12-LTSS
apache2-2.4.10-14.28.1
apache2-doc-2.4.10-14.28.1
apache2-example-pages-2.4.10-14.28.1
apache2-prefork-2.4.10-14.28.1
apache2-utils-2.4.10-14.28.1
apache2-worker-2.4.10-14.28.1

Описание

In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1

Ссылки

Описание

In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1

Ссылки

Описание

In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1

Ссылки

Описание

In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1

Ссылки

Описание

Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1
SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1

Ссылки