First published: Mon Nov 13 2017(Updated: )
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.<br>Security Fix(es):<br><li> It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)</li> <li> It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)</li> <li> A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)</li> <li> A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)</li> <li> A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)</li> Red Hat would like to thank Hanno Böck for reporting CVE-2017-9798.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.2.15-47.el6_7.5 | 2.2.15-47.el6_7.5 |
redhat/httpd | <2.2.15-47.el6_7.5 | 2.2.15-47.el6_7.5 |
redhat/httpd-debuginfo | <2.2.15-47.el6_7.5 | 2.2.15-47.el6_7.5 |
redhat/httpd-debuginfo | <2.2.15-47.el6_7.5 | 2.2.15-47.el6_7.5 |
redhat/httpd-devel | <2.2.15-47.el6_7.5 | 2.2.15-47.el6_7.5 |
redhat/httpd-devel | <2.2.15-47.el6_7.5 | 2.2.15-47.el6_7.5 |
redhat/httpd-manual | <2.2.15-47.el6_7.5 | 2.2.15-47.el6_7.5 |
redhat/httpd-tools | <2.2.15-47.el6_7.5 | 2.2.15-47.el6_7.5 |
redhat/httpd-tools | <2.2.15-47.el6_7.5 | 2.2.15-47.el6_7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2017:3195 is considered important, indicating a moderate risk to affected systems.
To fix RHSA-2017:3195, update the httpd packages to version 2.2.15-47.el6_7.5 or later.
RHSA-2017:3195 addresses a vulnerability in the mod_auth_digest module of the Apache HTTP Server that involves improper memory initialization.
RHSA-2017:3195 affects multiple packages, including httpd, httpd-debuginfo, httpd-devel, httpd-manual, and httpd-tools.
No, RHSA-2017:3195 is specifically applicable to the httpd version 2.2.15-47.el6_7.5 or earlier.