VID |
22797 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the version of Apache 2.2.x installed on the remote host is a version prior to 2.2.34. It is, therefore, affected by the following vulnerability :
The value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
* References: https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
* Platforms Affected: Apache HTTP versions 2.2.x prior to 2.2.34
Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache HTTP Server (2.2.34 or later), available from the Apache Software Foundation download site, http://httpd.apache.org/download.cgi |
Related URL |
CVE-2017-9788 (CVE) |
Related URL |
99569 (SecurityFocus) |
Related URL |
(ISS) |
|