Your submission was sent successfully! Close

CVE-2017-7668

Published: 19 June 2017

The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
apache2
Launchpad, Ubuntu, Debian
Upstream Pending
(2.2.33, 2.4.26)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.4.18-2ubuntu3.3)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.4.7-1ubuntu4.16)
Patches:
Upstream: https://www.apache.org/dist/httpd/patches/apply_to_2.2.32/CVE-2017-7668.patch
Upstream: https://github.com/apache/httpd/commit/a585e36e06a53170be6d2d462ceb5b30b8382988 (2.4)
Upstream: https://github.com/apache/httpd/commit/ad581ced12363ce82ffcb16133f236b2e31563e1 (2.2)