The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
07 Nov 2023, 02:50
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-06-20 01:29
Updated : 2024-02-28 16:04
NVD link : CVE-2017-7668
Mitre link : CVE-2017-7668
CVE.ORG link : CVE-2017-7668
JSON object : View
Products Affected
apple
- mac_os_x
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_eus
- enterprise_linux_server_tus
- enterprise_linux_workstation
netapp
- oncommand_unified_manager
- clustered_data_ontap
- storagegrid
oracle
- secure_global_desktop
apache
- http_server
debian
- debian_linux