The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2017-06-19 18:29
Updated : 2022-04-21 07:40
NVD link : CVE-2017-7668
Mitre link : CVE-2017-7668
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_eus
netapp
- clustered_data_ontap
- storagegrid
- oncommand_unified_manager
apache
- http_server
oracle
- secure_global_desktop
debian
- debian_linux
apple
- mac_os_x