First published: Fri Mar 23 2018(Updated: )
In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24 | <0:1-6.jbcs.el6 | 0:1-6.jbcs.el6 |
redhat/jbcs-httpd24-apache-commons-daemon-jsvc | <1:1.1.0-3.redhat_2.jbcs.el6 | 1:1.1.0-3.redhat_2.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-31.jbcs.el6 | 0:1.6.3-31.jbcs.el6 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-24.jbcs.el6 | 0:1.6.1-24.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.29-35.jbcs.el6 | 0:2.4.29-35.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.29.0-9.jbcs.el6 | 0:1.29.0-9.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2n-14.jbcs.el6 | 1:1.0.2n-14.jbcs.el6 |
redhat/jbcs-httpd24 | <0:1-6.jbcs.el7 | 0:1-6.jbcs.el7 |
redhat/jbcs-httpd24-apache-commons-daemon-jsvc | <1:1.1.0-3.redhat_2.jbcs.el7 | 1:1.1.0-3.redhat_2.jbcs.el7 |
redhat/jbcs-httpd24-apr | <0:1.6.3-31.jbcs.el7 | 0:1.6.3-31.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-24.jbcs.el7 | 0:1.6.1-24.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.29-35.jbcs.el7 | 0:2.4.29-35.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.29.0-9.jbcs.el7 | 0:1.29.0-9.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2n-14.jbcs.el7 | 1:1.0.2n-14.jbcs.el7 |
redhat/httpd | <0:2.4.6-93.el7 | 0:2.4.6-93.el7 |
redhat/httpd24-curl | <0:7.61.1-1.el6 | 0:7.61.1-1.el6 |
redhat/httpd24-httpd | <0:2.4.34-7.el6 | 0:2.4.34-7.el6 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el6 | 0:1.7.1-7.el6 |
redhat/httpd24-curl | <0:7.61.1-1.el7 | 0:7.61.1-1.el7 |
redhat/httpd24-httpd | <0:2.4.34-7.el7 | 0:2.4.34-7.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el7 | 0:1.7.1-7.el7 |
redhat/httpd | <2.4.30 | 2.4.30 |
Apache HTTP server | =2.4.1 | |
Apache HTTP server | =2.4.2 | |
Apache HTTP server | =2.4.3 | |
Apache HTTP server | =2.4.4 | |
Apache HTTP server | =2.4.6 | |
Apache HTTP server | =2.4.7 | |
Apache HTTP server | =2.4.9 | |
Apache HTTP server | =2.4.10 | |
Apache HTTP server | =2.4.12 | |
Apache HTTP server | =2.4.16 | |
Apache HTTP server | =2.4.17 | |
Apache HTTP server | =2.4.18 | |
Apache HTTP server | =2.4.20 | |
Apache HTTP server | =2.4.23 | |
Apache HTTP server | =2.4.25 | |
Apache HTTP server | =2.4.26 | |
Apache HTTP server | =2.4.27 | |
Apache HTTP server | =2.4.28 | |
Apache HTTP server | =2.4.29 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Netapp Santricity Cloud Connector | ||
Netapp Storage Automation Store | ||
Netapp Storagegrid | ||
NetApp Clustered Data ONTAP | ||
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.4 | |
Redhat Enterprise Linux | =7.5 | |
Redhat Enterprise Linux | =7.6 | |
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.62-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)