SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Server/CGI)  >   Apache HTTPD Vendors:   Apache Software Foundation
(HPE Issues Fix) Apache HTTPD Multiple Flaws Let Remote Users Deny Service, Conduct HTTP Response Splitting Attacks, and Access and Modify Session Data
SecurityTracker Alert ID:  1038163
SecurityTracker URL:  http://securitytracker.com/id/1038163
CVE Reference:   CVE-2016-0736, CVE-2016-2161, CVE-2016-8743   (Links to External Site)
Date:  Mar 30 2017
Impact:   Denial of service via network, Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 2.4.25
Description:   Multiple vulnerabilities were reported in Apache HTTPD. A remote user can access or modify session data. A remote user can cause the target service to crash. A remote user can conduct HTTP response splitting attacks.

The server does not strictly parse HTTP header data [CVE-2016-8743]. A remote user can submit a specially crafted URL to cause the target server to return a split response. A remote user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks.

A remote user can supply specially crafted data to mod_session_crypto to conduct a padding oracle attack and potentially access and modify session data [CVE-2016-0736].

A remote user can supply specially crafted data to mod_auth_digest to cause the target service to crash [CVE-2016-2161].

Alexander Neumann of RedTeam Pentesting, Maksim Malyutin, David Dennerline at IBM Security's X-Force Researchers, and Regis Leroy reported these vulnerabilities.

Impact:   A remote user can access or modify session data.

A remote user can cause the target service to crash.

A remote user can create a URL that, when loaded by the target user, will cause arbitrary content to be displayed.

A remote user may be able to poison any intermediate web caches with arbitrary content.

Solution:   HPE has issued a fix.

The HPE advisory is available at:

http://h20565.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbux03725en_us

Vendor URL:  h20565.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbux03725en_us (Links to External Site)
Cause:   Access control error, Authentication error, Input validation error
Underlying OS:  UNIX (HP/UX)
Underlying OS Comments:  B.11.31

Message History:   This archive entry is a follow-up to the message listed below.
Dec 21 2016 Apache HTTPD Multiple Flaws Let Remote Users Deny Service, Conduct HTTP Response Splitting Attacks, and Access and Modify Session Data



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC