The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
No history.
Information
Published : 2017-06-20 01:29
Updated : 2023-11-07 02:50
NVD link : CVE-2017-7668
Mitre link : CVE-2017-7668
CVE.ORG link : CVE-2017-7668
JSON object : View
Products Affected
apache
- http_server
redhat
- enterprise_linux_server
- enterprise_linux_server_aus
- enterprise_linux_desktop
- enterprise_linux_eus
- enterprise_linux_server_tus
- enterprise_linux_workstation
apple
- mac_os_x
netapp
- clustered_data_ontap
- oncommand_unified_manager
- storagegrid
debian
- debian_linux
oracle
- secure_global_desktop