Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Tech ARP] PAVP Mode from The BIOS Optimization Guide

Recommended Posts

Package : apache2

Version : 2.2.22-13+deb7u9

CVE ID : CVE-2017-3167 CVE-2017-3169 CVE-2017-7668 CVE-2017-7679

 

 

Several vulnerabilities have been found in the Apache HTTPD server.

 

CVE-2017-3167

 

Emmanuel Dreyfus reported that the use of ap_get_basic_auth_pw() by

third-party modules outside of the authentication phase may lead to

authentication requirements being bypassed.

 

CVE-2017-3169

 

Vasileios Panopoulos of AdNovum Informatik AG discovered that

mod_ssl may dereference a NULL pointer when third-party modules call

ap_hook_process_connection() during an HTTP request to an HTTPS port

leading to a denial of service.

 

CVE-2017-7668

 

Javier Jimenez reported that the HTTP strict parsing contains a flaw

leading to a buffer overread in ap_find_token(). A remote attacker

can take advantage of this flaw by carefully crafting a sequence of

request headers to cause a segmentation fault, or to force

ap_find_token() to return an incorrect value.

 

CVE-2017-7679

 

ChenQin and Hanno Boeck reported that mod_mime can read one byte

past the end of a buffer when sending a malicious Content-Type

response header.

 

For Debian 7 "Wheezy", these problems have been fixed in version

2.2.22-13+deb7u9.

 

We recommend that you upgrade your apache2 packages.

 

Further information about Debian LTS security advisories, how to apply

these updates to your system and frequently asked questions can be

found at: https://wiki.debian.org/LTS

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×