First published: Tue Jun 20 2017(Updated: )
apache. Multiple issues were addressed by updating to version 2.4.27.
Credit: CVE-2016-0736 CVE-2016-2161 CVE-2016-5387 CVE-2016-8740 CVE-2016-8743 CVE-2017-3167 CVE-2017-3169 CVE-2017-7659 CVE-2017-7668 CVE-2017-7679 CVE-2017-9788 CVE-2017-9789 security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.26 | 2.4.26 |
Apache HTTP server | =2.4.24 | |
Apache HTTP server | =2.4.25 | |
Apple macOS High Sierra | <10.13.1 | 10.13.1 |
Apple Sierra | ||
Apple El Capitan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7659 is a vulnerability in Apache HTTP Server 2.4.24 and 2.4.25 that could allow a malicious HTTP/2 request to crash the server process.
CVE-2017-7659 has a severity rating of 7.5 (high).
Apache HTTP Server versions 2.4.24 and 2.4.25, as well as Apple macOS High Sierra, Sierra, and El Capitan versions, are affected by CVE-2017-7659.
To fix CVE-2017-7659, you should update your Apache HTTP Server installation to version 2.4.26 or higher.
You can find more information about CVE-2017-7659 at the following references: [1] https://httpd.apache.org/security/vulnerabilities_24.html, [2] https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1463208, [3] https://github.com/apache/httpd/commit/672187c168b94b562d8065e08e2cad5b00cdd0e3