9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.668 Medium
EPSS
Percentile
97.9%
Issue Overview:
ap_find_token() buffer overread:
A buffer over-read flaw was found in the httpd’s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668 )
Apache HTTP Request Parsing Whitespace Defects:
It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)
ap_get_basic_auth_pw() authentication bypass:
It was discovered that the use of httpd’s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)
mod_mime buffer overread:
A buffer over-read flaw was found in the httpd’s mod_mime module. A user permitted to modify httpd’s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)
mod_http2 NULL pointer dereference:
A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request. (CVE-2017-7659)
mod_ssl NULL pointer dereference:
A NULL pointer dereference flaw was found in the httpd’s mod_ssl module. A remote attacker could use this flaw to cause a httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)
Affected Packages:
httpd24
Issue Correction:
Run yum update httpd24 to update your system.
New Packages:
i686:
mod24_session-2.4.27-3.71.amzn1.i686
mod24_proxy_html-2.4.27-3.71.amzn1.i686
httpd24-devel-2.4.27-3.71.amzn1.i686
httpd24-2.4.27-3.71.amzn1.i686
httpd24-tools-2.4.27-3.71.amzn1.i686
httpd24-debuginfo-2.4.27-3.71.amzn1.i686
mod24_ssl-2.4.27-3.71.amzn1.i686
mod24_ldap-2.4.27-3.71.amzn1.i686
noarch:
httpd24-manual-2.4.27-3.71.amzn1.noarch
src:
httpd24-2.4.27-3.71.amzn1.src
x86_64:
mod24_ldap-2.4.27-3.71.amzn1.x86_64
httpd24-tools-2.4.27-3.71.amzn1.x86_64
mod24_proxy_html-2.4.27-3.71.amzn1.x86_64
httpd24-2.4.27-3.71.amzn1.x86_64
httpd24-debuginfo-2.4.27-3.71.amzn1.x86_64
mod24_ssl-2.4.27-3.71.amzn1.x86_64
mod24_session-2.4.27-3.71.amzn1.x86_64
httpd24-devel-2.4.27-3.71.amzn1.x86_64
Red Hat: CVE-2016-8743, CVE-2017-3167, CVE-2017-3169, CVE-2017-7659, CVE-2017-7668, CVE-2017-7679
Mitre: CVE-2016-8743, CVE-2017-3167, CVE-2017-3169, CVE-2017-7659, CVE-2017-7668, CVE-2017-7679
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | mod24_session | < 2.4.27-3.71.amzn1 | mod24_session-2.4.27-3.71.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mod24_proxy_html | < 2.4.27-3.71.amzn1 | mod24_proxy_html-2.4.27-3.71.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd24-devel | < 2.4.27-3.71.amzn1 | httpd24-devel-2.4.27-3.71.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd24 | < 2.4.27-3.71.amzn1 | httpd24-2.4.27-3.71.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd24-tools | < 2.4.27-3.71.amzn1 | httpd24-tools-2.4.27-3.71.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd24-debuginfo | < 2.4.27-3.71.amzn1 | httpd24-debuginfo-2.4.27-3.71.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mod24_ssl | < 2.4.27-3.71.amzn1 | mod24_ssl-2.4.27-3.71.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mod24_ldap | < 2.4.27-3.71.amzn1 | mod24_ldap-2.4.27-3.71.amzn1.i686.rpm |
Amazon Linux | 1 | noarch | httpd24-manual | < 2.4.27-3.71.amzn1 | httpd24-manual-2.4.27-3.71.amzn1.noarch.rpm |
Amazon Linux | 1 | x86_64 | mod24_ldap | < 2.4.27-3.71.amzn1 | mod24_ldap-2.4.27-3.71.amzn1.x86_64.rpm |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.668 Medium
EPSS
Percentile
97.9%