First published: Tue Sep 19 2017(Updated: )
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =6.9 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Apache HTTP Server | =2.2.15-60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12171 is classified as a moderate severity vulnerability.
To fix CVE-2017-12171, update the httpd package to version 2.2.15-61 or later in Red Hat Enterprise Linux 6.9.
CVE-2017-12171 affects users running Red Hat Enterprise Linux 6.9 with Apache HTTP Server version 2.2.15-60.
The impact of CVE-2017-12171 allows unauthorized access to restricted HTTP resources due to incorrect parsing of comments in configuration lines.
No, CVE-2017-12171 specifically impacts the version of httpd 2.2.15-60 found in Red Hat Enterprise Linux 6.9.