diff options
author | ohauer <ohauer@FreeBSD.org> | 2016-12-21 18:35:20 +0800 |
---|---|---|
committer | ohauer <ohauer@FreeBSD.org> | 2016-12-21 18:35:20 +0800 |
commit | bf6e7ccd3a3807b3188f9a7f63b49ab254807598 (patch) | |
tree | f1d8abd8c39af2f91dd687af6b742178282ed3d2 /security | |
parent | 26b8aeeece6615718d6396a636b8e1be73480077 (diff) | |
download | freebsd-ports-gnome-bf6e7ccd3a3807b3188f9a7f63b49ab254807598.tar.gz freebsd-ports-gnome-bf6e7ccd3a3807b3188f9a7f63b49ab254807598.tar.zst freebsd-ports-gnome-bf6e7ccd3a3807b3188f9a7f63b49ab254807598.zip |
- document Apache httpd-2.4.x defects
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 104 |
1 files changed, 104 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 22c42bd66e09..554012e06343 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,110 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="862d6ab3-c75e-11e6-9f98-20cf30e32f6d"> + <topic>Apache httpd -- several vulnerabilities</topic> + <affects> + <package> + <name>apache24</name> + <range><lt>2.4.25</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Apache Software Foundation reports:</p> + <blockquote cite="http://httpd.apache.org/security/vulnerabilities_24.html"> + <ul> + <li>TBD: Apache HTTP Request Parsing Whitespace Defects CVE-2016-8743<br/> + Apache HTTP Server, prior to release 2.4.25, accepted a broad + pattern of unusual whitespace patterns from the user-agent, + including bare CR, FF, VTAB in parsing the request line and + request header lines, as well as HTAB in parsing the request line. + Any bare CR present in request lines was treated as whitespace and + remained in the request field member "the_request", while a bare + CR in the request header field name would be honored as + whitespace, and a bare CR in the request header field value was + retained the input headers array. Implied additional whitespace + was accepted in the request line and prior to the + ':' delimiter of any request header lines.<br/><br/> + RFC7230 Section 3.5 calls out some of these whitespace exceptions, + and section 3.2.3 eliminated and clarified the role of implied + whitespace in the grammer of this specification. Section 3.1.1 + requires exactly one single SP between the method and + request-target, and between the request-target and HTTP-version, + followed immediately by a CRLF sequence. None of these + fields permit any (unencoded) CTL character whatsoever. Section + 3.2.4 explicitly disallowed any whitespace from the request header + field prior to the ':' character, while Section 3.2 disallows all + CTL characters in the request header line other than the HTAB + character as whitespace.<br/><br/> + These defects represent a security concern when httpd is + participating in any chain of proxies or interacting with back-end + application servers, either through mod_proxy or using conventional + CGI mechanisms. In each case where one agent accepts such CTL + characters and does not treat them as whitespace, there is the + possiblity in a proxy chain of generating two responses from a + server behind the uncautious proxy agent. In a sequence of two + requests, this results in request A to the first proxy being + interpreted as requests A + A' by the backend server, and if + requests A and B were submitted to the first proxy in a keepalive + connection, the proxy may interpret response A' as the response to + request B, polluting the cache or potentially serving the A' content + to a different downstream user-agent.<br/><br/> + These defects are addressed with the release of Apache HTTP Server + 2.4.25 and coordinated by a new directive<br/> + HttpProtocolOptions Strict<br/> + </li> + </ul><ul> + <li>low: DoS vulnerability in mod_auth_digest CVE-2016-2161<br/> + Malicious input to mod_auth_digest will cause the server to crash, + and each instance continues to crash even for subsequently valid + requests.<br/> + </li> + </ul><ul> + <li>low: Padding Oracle in Apache mod_session_crypto CVE-2016-0736<br/> + Authenticate the session data/cookie presented to mod_session_crypto + with a MAC (SipHash) to prevent deciphering or tampering with a + padding oracle attack.<br/> + </li> + </ul><ul> + <li>low: Padding Oracle in Apache mod_session_crypto CVE-2016-0736<br/> + Authenticate the session data/cookie presented to mod_session_crypto + with a MAC (SipHash) to prevent deciphering or tampering with a + padding oracle attack.<br/> + </li> + </ul><ul> + <li>n/a: HTTP/2 CONTINUATION denial of service CVE-2016-8740<br/> + The HTTP/2 protocol implementation (mod_http2) had an incomplete + handling of the LimitRequestFields directive. This allowed an + attacker to inject unlimited request headers into the server, + leading to eventual memory exhaustion.<br/> + </li> + </ul><ul> + <li>n/a: HTTP_PROXY environment variable "httpoxy" mitigation CVE-2016-5387<br/> + HTTP_PROXY is a well-defined environment variable in a CGI process, + which collided with a number of libraries which failed to avoid + colliding with this CGI namespace. A mitigation is provided for the + httpd CGI environment to avoid populating the "HTTP_PROXY" variable + from a "Proxy:" header, which has never been registered by IANA. + </li> + </ul> + </blockquote> + </body> + </description> + <references> + <url>http://httpd.apache.org/security/vulnerabilities_24.html</url> + <cvename>CVE-2016-8743</cvename> + <cvename>CVE-2016-2161</cvename> + <cvename>CVE-2016-0736</cvename> + <cvename>CVE-2016-8740</cvename> + <cvename>CVE-2016-5387</cvename> + </references> + <dates> + <discovery>2016-12-20</discovery> + <entry>2016-12-21</entry> + </dates> + </vuln> + <vuln vid="942433db-c661-11e6-ae1b-002590263bf5"> <topic>xen-kernel -- x86: Mishandling of SYSCALL singlestep during emulation</topic> <affects> |