First published: Mon Mar 26 2018(Updated: )
In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.30 | 2.4.30 |
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.63-1 | |
Apache Http Server | =2.4.1 | |
Apache Http Server | =2.4.2 | |
Apache Http Server | =2.4.3 | |
Apache Http Server | =2.4.4 | |
Apache Http Server | =2.4.6 | |
Apache Http Server | =2.4.7 | |
Apache Http Server | =2.4.9 | |
Apache Http Server | =2.4.10 | |
Apache Http Server | =2.4.12 | |
Apache Http Server | =2.4.16 | |
Apache Http Server | =2.4.17 | |
Apache Http Server | =2.4.18 | |
Apache Http Server | =2.4.20 | |
Apache Http Server | =2.4.23 | |
Apache Http Server | =2.4.25 | |
Apache Http Server | =2.4.26 | |
Apache Http Server | =2.4.27 | |
Apache Http Server | =2.4.28 | |
Apache Http Server | =2.4.29 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Ubuntu | =18.04 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
netapp cloud backup | ||
netapp storagegrid | ||
IBM Data ONTAP | ||
All of | ||
redhat jboss core services | =1.0 | |
Any of | ||
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =7.0 | |
redhat jboss core services | =1.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1312 is a vulnerability in Apache httpd that allows for HTTP request replay attacks.
CVE-2018-1312 has a severity rating of 9.8 (Critical).
Apache httpd versions 2.2.0 to 2.4.29 are affected.
To fix CVE-2018-1312, you need to upgrade Apache httpd to version 2.4.30 or higher.
You can find more information about CVE-2018-1312 on the Apache httpd website and the Redhat Bugzilla website.