httpd24-httpd-2.4.25-9.AXS4.1
エラータID: AXSA:2017-2175:02
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and
extensible web server.
Security Fix(es):
* It was discovered that the httpd's mod_auth_digest module did not properly
initialize memory before using it when processing certain headers related to
digest authentication. A remote attacker could possibly use this flaw to
disclose potentially sensitive information or cause httpd child process to crash
by sending specially crafted requests to a server. (CVE-2017-9788)
* It was discovered that the use of httpd's ap_get_basic_auth_pw() API
function outside of the authentication phase could lead to authentication
bypass. A remote attacker could possibly use this flaw to bypass required
authentication if the API was used incorrectly by one of the modules used by
httpd. (CVE-2017-3167)
* A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A
remote attacker could use this flaw to cause an httpd child process to crash if
another module used by httpd called a certain API function during the processing
of an HTTPS request. (CVE-2017-3169)
* A NULL pointer dereference flaw was found in the mod_http2 module of httpd.
A remote attacker could use this flaw to cause httpd child process to crash via
a specially crafted HTTP/2 request. (CVE-2017-7659)
* A buffer over-read flaw was found in the httpd's ap_find_token() function. A
remote attacker could use this flaw to cause httpd child process to crash via a
specially crafted HTTP request. (CVE-2017-7668)
* A buffer over-read flaw was found in the httpd's mod_mime module. A user
permitted to modify httpd's MIME configuration could use this flaw to cause
httpd child process to crash. (CVE-2017-7679)
CVE-2017-3167
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of
the ap_get_basic_auth_pw() by third-party modules outside of the
authentication phase may lead to authentication requirements being
bypassed.
CVE-2017-3169
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl
may dereference a NULL pointer when third-party modules call
ap_hook_process_connection() during an HTTP request to an HTTPS port.
CVE-2017-7659
A maliciously constructed HTTP/2 request could cause mod_http2 2.4.24,
2.4.25 to dereference a NULL pointer and crash the server process.
CVE-2017-7668
The HTTP strict parsing changes added in Apache httpd 2.2.32 and
2.4.24 introduced a bug in token list parsing, which allows
ap_find_token() to search past the end of its input string. By
maliciously crafting a sequence of request headers, an attacker may be
able to cause a segmentation fault, or to force ap_find_token() to
return an incorrect value.
CVE-2017-7679
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime
can read one byte past the end of a buffer when sending a malicious
Content-Type response header.
CVE-2017-9788
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value
placeholder in [Proxy-]Authorization headers of type 'Digest' was not
initialized or reset before or between successive key=value
assignments by mod_auth_digest. Providing an initial key with no '='
assignment could reflect the stale value of uninitialized pool memory
used by the prior request, leading to leakage of potentially
confidential information, and a segfault in other cases resulting in
denial of service.
Update packages.
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.
The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
N/A
SRPMS
- httpd24-httpd-2.4.25-9.AXS4.1.src.rpm
MD5: 2fc89798bc1c60259ab1a6eb315eebd9
SHA-256: f0a56f9d8f5a7951d14aaeb56b4c7168d66ff7576344f8a208410cf6f4c0938c
Size: 6.19 MB
Asianux Server 4 for x86_64
- httpd24-httpd-2.4.25-9.AXS4.1.x86_64.rpm
MD5: 9fbc4bd24bcc53a9febbfa34f95f8022
SHA-256: e13ff08bfda80642cac9c169ba167f84fe7ae42e8ce7cb7e0f75a52bba17f7ca
Size: 1.24 MB - httpd24-httpd-devel-2.4.25-9.AXS4.1.x86_64.rpm
MD5: 1800a53f12a727fdfd815f6e74eb3ca2
SHA-256: f91abc0552462880b53caeee3011266c2bad8818fa7c2a28db5ab29e8b29fb52
Size: 202.82 kB - httpd24-httpd-manual-2.4.25-9.AXS4.1.noarch.rpm
MD5: de23e6f3a325c480325cdac7c5fe41bd
SHA-256: 26411c4631d9a99c86111fc011784359167e1fc9400f3d560b3f97b81ebb3519
Size: 2.35 MB - httpd24-httpd-tools-2.4.25-9.AXS4.1.x86_64.rpm
MD5: c0d1db12bef1ce25103930c5da9b5faa
SHA-256: 3249dcb6f937e7e489c3e2e5daa39e9327c1544daa2fea9d1e0afe15b85a73b3
Size: 78.94 kB - httpd24-mod_ldap-2.4.25-9.AXS4.1.x86_64.rpm
MD5: fe79a862421ee6e5a6d44dcb08be8e5f
SHA-256: 7cfba5e92907e88c1299b128cebfa5fae15dbca806e85c18b1fc76cdf2f99a19
Size: 62.40 kB - httpd24-mod_proxy_html-2.4.25-9.AXS4.1.x86_64.rpm
MD5: 62f4cc22fae90cdb524f96c74bb89d9e
SHA-256: 616041731ac06bbdb5113074569e62c0ea3203201bd4017341f5fde88a98ff30
Size: 40.62 kB - httpd24-mod_session-2.4.25-9.AXS4.1.x86_64.rpm
MD5: e9a1077be91682202aa4bcda608cdd80
SHA-256: dca51b4395933bf7d999e2a09e2f84e30da06b1285bfe568741584fbf6de27e6
Size: 48.38 kB - httpd24-mod_ssl-2.4.25-9.AXS4.1.x86_64.rpm
MD5: 074604ce3b52e46ada4cde9a2183ee48
SHA-256: ce260210f5b5aee8bfedd8e6fd576d5f4b3fee271521aed0c5c2b9230d65fe6e
Size: 103.23 kB