httpd24-httpd-2.4.25-9.AXS4.1

エラータID: AXSA:2017-2175:02

Release date: 
Tuesday, September 12, 2017 - 18:41
Subject: 
httpd24-httpd-2.4.25-9.AXS4.1
Affected Channels: 
Asianux Server 4 for x86_64
Severity: 
High
Description: 

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and
extensible web server.

Security Fix(es):

* It was discovered that the httpd's mod_auth_digest module did not properly
initialize memory before using it when processing certain headers related to
digest authentication. A remote attacker could possibly use this flaw to
disclose potentially sensitive information or cause httpd child process to crash
by sending specially crafted requests to a server. (CVE-2017-9788)

* It was discovered that the use of httpd's ap_get_basic_auth_pw() API
function outside of the authentication phase could lead to authentication
bypass. A remote attacker could possibly use this flaw to bypass required
authentication if the API was used incorrectly by one of the modules used by
httpd. (CVE-2017-3167)

* A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A
remote attacker could use this flaw to cause an httpd child process to crash if
another module used by httpd called a certain API function during the processing
of an HTTPS request. (CVE-2017-3169)

* A NULL pointer dereference flaw was found in the mod_http2 module of httpd.
A remote attacker could use this flaw to cause httpd child process to crash via
a specially crafted HTTP/2 request. (CVE-2017-7659)

* A buffer over-read flaw was found in the httpd's ap_find_token() function. A
remote attacker could use this flaw to cause httpd child process to crash via a
specially crafted HTTP request. (CVE-2017-7668)

* A buffer over-read flaw was found in the httpd's mod_mime module. A user
permitted to modify httpd's MIME configuration could use this flaw to cause
httpd child process to crash. (CVE-2017-7679)

CVE-2017-3167
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of
the ap_get_basic_auth_pw() by third-party modules outside of the
authentication phase may lead to authentication requirements being
bypassed.
CVE-2017-3169
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl
may dereference a NULL pointer when third-party modules call
ap_hook_process_connection() during an HTTP request to an HTTPS port.
CVE-2017-7659
A maliciously constructed HTTP/2 request could cause mod_http2 2.4.24,
2.4.25 to dereference a NULL pointer and crash the server process.
CVE-2017-7668
The HTTP strict parsing changes added in Apache httpd 2.2.32 and
2.4.24 introduced a bug in token list parsing, which allows
ap_find_token() to search past the end of its input string. By
maliciously crafting a sequence of request headers, an attacker may be
able to cause a segmentation fault, or to force ap_find_token() to
return an incorrect value.
CVE-2017-7679
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime
can read one byte past the end of a buffer when sending a malicious
Content-Type response header.
CVE-2017-9788
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value
placeholder in [Proxy-]Authorization headers of type 'Digest' was not
initialized or reset before or between successive key=value
assignments by mod_auth_digest. Providing an initial key with no '='
assignment could reflect the stale value of uninitialized pool memory
used by the prior request, leading to leakage of potentially
confidential information, and a segfault in other cases resulting in
denial of service.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. httpd24-httpd-2.4.25-9.AXS4.1.src.rpm
    MD5: 2fc89798bc1c60259ab1a6eb315eebd9
    SHA-256: f0a56f9d8f5a7951d14aaeb56b4c7168d66ff7576344f8a208410cf6f4c0938c
    Size: 6.19 MB

Asianux Server 4 for x86_64
  1. httpd24-httpd-2.4.25-9.AXS4.1.x86_64.rpm
    MD5: 9fbc4bd24bcc53a9febbfa34f95f8022
    SHA-256: e13ff08bfda80642cac9c169ba167f84fe7ae42e8ce7cb7e0f75a52bba17f7ca
    Size: 1.24 MB
  2. httpd24-httpd-devel-2.4.25-9.AXS4.1.x86_64.rpm
    MD5: 1800a53f12a727fdfd815f6e74eb3ca2
    SHA-256: f91abc0552462880b53caeee3011266c2bad8818fa7c2a28db5ab29e8b29fb52
    Size: 202.82 kB
  3. httpd24-httpd-manual-2.4.25-9.AXS4.1.noarch.rpm
    MD5: de23e6f3a325c480325cdac7c5fe41bd
    SHA-256: 26411c4631d9a99c86111fc011784359167e1fc9400f3d560b3f97b81ebb3519
    Size: 2.35 MB
  4. httpd24-httpd-tools-2.4.25-9.AXS4.1.x86_64.rpm
    MD5: c0d1db12bef1ce25103930c5da9b5faa
    SHA-256: 3249dcb6f937e7e489c3e2e5daa39e9327c1544daa2fea9d1e0afe15b85a73b3
    Size: 78.94 kB
  5. httpd24-mod_ldap-2.4.25-9.AXS4.1.x86_64.rpm
    MD5: fe79a862421ee6e5a6d44dcb08be8e5f
    SHA-256: 7cfba5e92907e88c1299b128cebfa5fae15dbca806e85c18b1fc76cdf2f99a19
    Size: 62.40 kB
  6. httpd24-mod_proxy_html-2.4.25-9.AXS4.1.x86_64.rpm
    MD5: 62f4cc22fae90cdb524f96c74bb89d9e
    SHA-256: 616041731ac06bbdb5113074569e62c0ea3203201bd4017341f5fde88a98ff30
    Size: 40.62 kB
  7. httpd24-mod_session-2.4.25-9.AXS4.1.x86_64.rpm
    MD5: e9a1077be91682202aa4bcda608cdd80
    SHA-256: dca51b4395933bf7d999e2a09e2f84e30da06b1285bfe568741584fbf6de27e6
    Size: 48.38 kB
  8. httpd24-mod_ssl-2.4.25-9.AXS4.1.x86_64.rpm
    MD5: 074604ce3b52e46ada4cde9a2183ee48
    SHA-256: ce260210f5b5aee8bfedd8e6fd576d5f4b3fee271521aed0c5c2b9230d65fe6e
    Size: 103.23 kB