httpd24-httpd-2.4.25-9.el7.1

エラータID: AXSA:2017-2226:02

リリース日: 
2017/09/14 Thursday - 20:54
題名: 
httpd24-httpd-2.4.25-9.el7.1
影響のあるチャネル: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and
extensible web server.

Security Fix(es):

* It was discovered that the httpd's mod_auth_digest module did not properly
initialize memory before using it when processing certain headers related to
digest authentication. A remote attacker could possibly use this flaw to
disclose potentially sensitive information or cause httpd child process to crash
by sending specially crafted requests to a server. (CVE-2017-9788)

* It was discovered that the use of httpd's ap_get_basic_auth_pw() API
function outside of the authentication phase could lead to authentication
bypass. A remote attacker could possibly use this flaw to bypass required
authentication if the API was used incorrectly by one of the modules used by
httpd. (CVE-2017-3167)

* A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A
remote attacker could use this flaw to cause an httpd child process to crash if
another module used by httpd called a certain API function during the processing
of an HTTPS request. (CVE-2017-3169)

* A NULL pointer dereference flaw was found in the mod_http2 module of httpd.
A remote attacker could use this flaw to cause httpd child process to crash via
a specially crafted HTTP/2 request. (CVE-2017-7659)

* A buffer over-read flaw was found in the httpd's ap_find_token() function. A
remote attacker could use this flaw to cause httpd child process to crash via a
specially crafted HTTP request. (CVE-2017-7668)

* A buffer over-read flaw was found in the httpd's mod_mime module. A user
permitted to modify httpd's MIME configuration could use this flaw to cause
httpd child process to crash. (CVE-2017-7679)

CVE-2017-3167
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of
the ap_get_basic_auth_pw() by third-party modules outside of the
authentication phase may lead to authentication requirements being
bypassed.
CVE-2017-3169
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl
may dereference a NULL pointer when third-party modules call
ap_hook_process_connection() during an HTTP request to an HTTPS port.
CVE-2017-7659
A maliciously constructed HTTP/2 request could cause mod_http2 2.4.24,
2.4.25 to dereference a NULL pointer and crash the server process.
CVE-2017-7668
The HTTP strict parsing changes added in Apache httpd 2.2.32 and
2.4.24 introduced a bug in token list parsing, which allows
ap_find_token() to search past the end of its input string. By
maliciously crafting a sequence of request headers, an attacker may be
able to cause a segmentation fault, or to force ap_find_token() to
return an incorrect value.
CVE-2017-7679
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime
can read one byte past the end of a buffer when sending a malicious
Content-Type response header.
CVE-2017-9788
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value
placeholder in [Proxy-]Authorization headers of type 'Digest' was not
initialized or reset before or between successive key=value
assignments by mod_auth_digest. Providing an initial key with no '='
assignment could reflect the stale value of uninitialized pool memory
used by the prior request, leading to leakage of potentially
confidential information, and a segfault in other cases resulting in
denial of service.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. httpd24-httpd-2.4.25-9.el7.1.src.rpm
    MD5: 6e8f235514c6f3920cf239c21e361595
    SHA-256: 98d83f3bee5d86782aaa36db87d524f1d3b1a2de1ea341628ddf7f8e3f367600
    Size: 6.19 MB

Asianux Server 7 for x86_64
  1. httpd24-httpd-2.4.25-9.el7.1.x86_64.rpm
    MD5: c2c80940c2c5a6cbcf5689fbc02b1dc3
    SHA-256: 3f8922af5545e94e8ab9546d849116f8f10fe8b37a6bdad189bfd89acf2dcbef
    Size: 1.34 MB
  2. httpd24-httpd-devel-2.4.25-9.el7.1.x86_64.rpm
    MD5: 11a5631f946b2ffa395c7de68e870086
    SHA-256: 5f0efce7af4338e58ae8ea605b395226cc6cafe8b3681d803aab56e828fb715f
    Size: 200.22 kB
  3. httpd24-httpd-manual-2.4.25-9.el7.1.noarch.rpm
    MD5: a1a8643790a1ad5ff0417ff446cbc9a9
    SHA-256: 7e693bd95b5cbfa5a7e0f0382264f7d646e4e7af5bfa35bfe6fda0acaec7f90c
    Size: 2.31 MB
  4. httpd24-httpd-tools-2.4.25-9.el7.1.x86_64.rpm
    MD5: ad7ed867cf93bc0bca31653696d9e4bb
    SHA-256: c1498ae7c38d37b569c5678c1222a769a55e464e6db8879f0f4b84fa3bef5b88
    Size: 83.82 kB
  5. httpd24-mod_ldap-2.4.25-9.el7.1.x86_64.rpm
    MD5: 01d9775145833883e319474f8c547430
    SHA-256: 86c6eec04cfdda35d287019d66fced75bb9ad17a69d675ffaf25bd9c1ec01f44
    Size: 64.75 kB
  6. httpd24-mod_proxy_html-2.4.25-9.el7.1.x86_64.rpm
    MD5: 6a77d7bd87f11de774d0b104cffb4e2c
    SHA-256: 830027d2fc32e1e133c15e7b71a517c5feacbf6621e0f89afa0b50df7ce85cc6
    Size: 42.46 kB
  7. httpd24-mod_session-2.4.25-9.el7.1.x86_64.rpm
    MD5: a7867fc6e1f9eefcec5024e5c0cb2197
    SHA-256: 143278c384d879a4850a2628548fc3eeab9128d05d1f1fb35a856427558ca03e
    Size: 53.54 kB
  8. httpd24-mod_ssl-2.4.25-9.el7.1.x86_64.rpm
    MD5: c2549142a2cbacb4dc4d51915de6e6bc
    SHA-256: 43be61dd8217edbbce5ff4ce345748626788c7e493f603f488e40b6126248e2f
    Size: 107.03 kB