First published: Fri Mar 23 2018(Updated: )
In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24 | <0:1-6.jbcs.el6 | 0:1-6.jbcs.el6 |
redhat/jbcs-httpd24-apache-commons-daemon-jsvc | <1:1.1.0-3.redhat_2.jbcs.el6 | 1:1.1.0-3.redhat_2.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-31.jbcs.el6 | 0:1.6.3-31.jbcs.el6 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-24.jbcs.el6 | 0:1.6.1-24.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.29-35.jbcs.el6 | 0:2.4.29-35.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.29.0-9.jbcs.el6 | 0:1.29.0-9.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2n-14.jbcs.el6 | 1:1.0.2n-14.jbcs.el6 |
redhat/jbcs-httpd24 | <0:1-6.jbcs.el7 | 0:1-6.jbcs.el7 |
redhat/jbcs-httpd24-apache-commons-daemon-jsvc | <1:1.1.0-3.redhat_2.jbcs.el7 | 1:1.1.0-3.redhat_2.jbcs.el7 |
redhat/jbcs-httpd24-apr | <0:1.6.3-31.jbcs.el7 | 0:1.6.3-31.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-24.jbcs.el7 | 0:1.6.1-24.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.29-35.jbcs.el7 | 0:2.4.29-35.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.29.0-9.jbcs.el7 | 0:1.29.0-9.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2n-14.jbcs.el7 | 1:1.0.2n-14.jbcs.el7 |
redhat/httpd | <0:2.4.6-93.el7 | 0:2.4.6-93.el7 |
redhat/httpd24-curl | <0:7.61.1-1.el6 | 0:7.61.1-1.el6 |
redhat/httpd24-httpd | <0:2.4.34-7.el6 | 0:2.4.34-7.el6 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el6 | 0:1.7.1-7.el6 |
redhat/httpd24-curl | <0:7.61.1-1.el7 | 0:7.61.1-1.el7 |
redhat/httpd24-httpd | <0:2.4.34-7.el7 | 0:2.4.34-7.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el7 | 0:1.7.1-7.el7 |
redhat/httpd | <2.4.30 | 2.4.30 |
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.63-1 | |
Apache Http Server | =2.4.1 | |
Apache Http Server | =2.4.2 | |
Apache Http Server | =2.4.3 | |
Apache Http Server | =2.4.4 | |
Apache Http Server | =2.4.6 | |
Apache Http Server | =2.4.7 | |
Apache Http Server | =2.4.9 | |
Apache Http Server | =2.4.10 | |
Apache Http Server | =2.4.12 | |
Apache Http Server | =2.4.16 | |
Apache Http Server | =2.4.17 | |
Apache Http Server | =2.4.18 | |
Apache Http Server | =2.4.20 | |
Apache Http Server | =2.4.23 | |
Apache Http Server | =2.4.25 | |
Apache Http Server | =2.4.26 | |
Apache Http Server | =2.4.27 | |
Apache Http Server | =2.4.28 | |
Apache Http Server | =2.4.29 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Ubuntu | =18.04 | |
NetApp SANtricity Cloud Connector | ||
NetApp Storage Automation Store | ||
netapp storagegrid | ||
IBM Data ONTAP | ||
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =7.4 | |
Red Hat Enterprise Linux | =7.5 | |
Red Hat Enterprise Linux | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2017-15710 is categorized as a moderate severity vulnerability.
To fix CVE-2017-15710, ensure you are using the patched versions of affected packages, such as apache-commons-daemon, httpd, and openssl, as specified in the remediation information.
CVE-2017-15710 affects Apache HTTP Server versions 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29.
If CVE-2017-15710 is not addressed, unauthorized users may exploit the vulnerability to bypass authentication and gain unauthorized access.
CVE-2017-15710 can affect various operating systems where Apache HTTPD is installed, particularly on RHEL and Debian based distributions.