First published: Sat Mar 25 2017(Updated: )
apt-cacher before 1.7.15 and apt-cacher-ng before 3.4 allow HTTP response splitting via encoded newline characters, related to lack of blocking for the %0[ad] regular expression.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/apt-cacher | 1.7.22 1.7.29 1.7.30 | |
debian/apt-cacher-ng | 3.6.4-1 3.7.4-1 3.7.5-1 | |
apt-cacher-ng | <=3.3 | |
Debian Apt-cacher | <=1.7.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7443 is classified as a medium severity vulnerability due to its potential impact on HTTP response splitting.
To resolve CVE-2017-7443, update apt-cacher to version 1.7.22 or higher, or apt-cacher-ng to version 3.6.4-1 or higher.
CVE-2017-7443 affects apt-cacher versions below 1.7.15 and apt-cacher-ng versions below 3.4.
Yes, CVE-2017-7443 can allow attackers to exploit HTTP response splitting which may lead to further attacks.
CVE-2017-7443 is exploitable specifically in environments using the affected versions of apt-cacher and apt-cacher-ng.