CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-7668 Amazon Linux Security Advisory for httpd24: ALAS-2017-863

2017年8月13日 1332点热度 0人点赞 0条评论

漏洞类别:Amazon Linux

漏洞等级:

漏洞信息

ap_find_token() buffer overread:
A buffer over-read flaw was found in the httpd's ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668 )

Apache HTTP Request Parsing Whitespace Defects:
It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743 )

ap_get_basic_auth_pw() authentication bypass:
It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167 )

mod_mime buffer overread:
A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679 )

mod_http2 NULL pointer dereference:
A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request. (CVE-2017-7659 )

mod_ssl NULL pointer dereference:
A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause a httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169 )

QID Detection Logic:
This authenticated QID verifies if the version of the following files is lesser than 2.4.27-3.71.amzn1: mod24_ldap, httpd24-tools, mod24_proxy_html, httpd24, httpd24-debuginfo, mod24_ssl, mod24_session, httpd24-devel, httpd24-manual

漏洞危害

Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.

解决方案

Please refer to Amazon advisory ALAS-2017-863 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

ALAS-2017-863: Amazon Linux (httpd24 (2.4.27-3.71.amzn1) on noarch)

ALAS-2017-863: Amazon Linux (httpd24 (2.4.27-3.71.amzn1) on x86_64)

ALAS-2017-863: Amazon Linux (httpd24 (2.4.27-3.71.amzn1) on src)

ALAS-2017-863: Amazon Linux (httpd24 (2.4.27-3.71.amzn1) on i686)

0daybank

标签: 暂无
最后更新:2017年8月13日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me