[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1009-1] apache2 security update



Package        : apache2
Version        : 2.2.22-13+deb7u9
CVE ID         : CVE-2017-3167 CVE-2017-3169 CVE-2017-7668 CVE-2017-7679


Several vulnerabilities have been found in the Apache HTTPD server.

CVE-2017-3167

    Emmanuel Dreyfus reported that the use of ap_get_basic_auth_pw() by
    third-party modules outside of the authentication phase may lead to
    authentication requirements being bypassed.

CVE-2017-3169

    Vasileios Panopoulos of AdNovum Informatik AG discovered that
    mod_ssl may dereference a NULL pointer when third-party modules call
    ap_hook_process_connection() during an HTTP request to an HTTPS port
    leading to a denial of service.

CVE-2017-7668

    Javier Jimenez reported that the HTTP strict parsing contains a flaw
    leading to a buffer overread in ap_find_token(). A remote attacker
    can take advantage of this flaw by carefully crafting a sequence of
    request headers to cause a segmentation fault, or to force
    ap_find_token() to return an incorrect value.

CVE-2017-7679

    ChenQin and Hanno Boeck reported that mod_mime can read one byte
    past the end of a buffer when sending a malicious Content-Type
    response header.

For Debian 7 "Wheezy", these problems have been fixed in version
2.2.22-13+deb7u9.

We recommend that you upgrade your apache2 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: Digital signature


Reply to: