Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-8743
HistoryDec 22, 2016 - 12:00 a.m.

CVE-2016-8743

2016-12-2200:00:00
ubuntu.com
ubuntu.com
35

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.003 Low

EPSS

Percentile

67.5%

Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal
in the whitespace accepted from requests and sent in response lines and
headers. Accepting these different behaviors represented a security concern
when httpd participates in any chain of proxies or interacts with back-end
application servers, either through mod_proxy or using conventional CGI
mechanisms, and may result in request smuggling, response splitting and
cache pollution.

Bugs

Notes

Author Note
ratliff Notes from Debian “The fix is not fully backwards compatible so upstream have created a new option to control this behaviour. Affects: 2.2.0 to 2.4.23.”
mdeslaur This fix no longer allows underscores in host names. Debian added a patch to restore the behaviour: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851357 http://mail-archives.apache.org/mod_mbox/httpd-dev/201702.mbox/<20170202125319.GA15948%40redhat.com> The new configuration option doesn’t entirely preserve backwards compatibility: https://bz.apache.org/bugzilla/show_bug.cgi?id=60783
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchapache2< 2.4.7-1ubuntu4.15UNKNOWN
ubuntu16.04noarchapache2< 2.4.18-2ubuntu3.2UNKNOWN
ubuntu16.10noarchapache2< 2.4.18-2ubuntu4.1UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.003 Low

EPSS

Percentile

67.5%