Lucene search

K
nvd[email protected]NVD:CVE-2017-15710
HistoryMar 26, 2018 - 3:29 p.m.

CVE-2017-15710

2018-03-2615:29:00
CWE-787
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.1 High

AI Score

Confidence

High

0.026 Low

EPSS

Percentile

90.4%

In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user’s credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, β€˜en-US’ is truncated to β€˜en’). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.

Affected configurations

NVD
Node
apachehttp_serverMatch2.4.1
OR
apachehttp_serverMatch2.4.2
OR
apachehttp_serverMatch2.4.3
OR
apachehttp_serverMatch2.4.4
OR
apachehttp_serverMatch2.4.6
OR
apachehttp_serverMatch2.4.7
OR
apachehttp_serverMatch2.4.9
OR
apachehttp_serverMatch2.4.10
OR
apachehttp_serverMatch2.4.12
OR
apachehttp_serverMatch2.4.16
OR
apachehttp_serverMatch2.4.17
OR
apachehttp_serverMatch2.4.18
OR
apachehttp_serverMatch2.4.20
OR
apachehttp_serverMatch2.4.23
OR
apachehttp_serverMatch2.4.25
OR
apachehttp_serverMatch2.4.26
OR
apachehttp_serverMatch2.4.27
OR
apachehttp_serverMatch2.4.28
OR
apachehttp_serverMatch2.4.29
Node
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0
Node
canonicalubuntu_linuxMatch12.04esm
OR
canonicalubuntu_linuxMatch14.04lts
OR
canonicalubuntu_linuxMatch16.04lts
OR
canonicalubuntu_linuxMatch17.10
OR
canonicalubuntu_linuxMatch18.04lts
Node
netappsantricity_cloud_connectorMatch-
OR
netappstorage_automation_storeMatch-
OR
netappstoragegridMatch-
OR
netappclustered_data_ontapMatch-
Node
redhatenterprise_linuxMatch6.0
OR
redhatenterprise_linuxMatch7.0
OR
redhatenterprise_linuxMatch7.4
OR
redhatenterprise_linuxMatch7.5
OR
redhatenterprise_linuxMatch7.6

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.1 High

AI Score

Confidence

High

0.026 Low

EPSS

Percentile

90.4%