First published: Tue Jun 20 2017(Updated: )
apache. Multiple issues were addressed by updating to version 2.4.27.
Credit: CVE-2016-0736 CVE-2016-2161 CVE-2016-5387 CVE-2016-8740 CVE-2016-8743 CVE-2017-3167 CVE-2017-3169 CVE-2017-7659 CVE-2017-7668 CVE-2017-7679 CVE-2017-9788 CVE-2017-9789 security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | >=2.2.0<2.2.33 | |
Apache HTTP server | >=2.4.0<2.4.26 | |
redhat/httpd | <2.2.34 | 2.2.34 |
redhat/httpd | <2.4.26 | 2.4.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7679 is a vulnerability found in Apache httpd that allows an attacker to read one byte past the end of a buffer when sending a malicious Content-Type response header.
CVE-2017-7679 affects Apache httpd versions 2.2.x before 2.2.33 and 2.4.x before 2.4.26.
CVE-2017-7679 has a severity rating of 9.8 (Critical).
To fix CVE-2017-7679, update Apache httpd to version 2.2.34 or 2.4.26.
You can find more information about CVE-2017-7679 at the following references: [1](https://lists.apache.org/thread.html/f4515e580dfb6eeca589a5cdebd4c4c709ce632b12924f343c3b7751@%3Cdev.httpd.apache.org%3E), [2](https://httpd.apache.org/security/vulnerabilities_24.html), [3](https://httpd.apache.org/security/vulnerabilities_22.html).