CVE-2016-0736

Priority
Medium
Description
In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was
encrypting its data/cookie using the configured ciphers with possibly
either CBC or ECB modes of operation (AES256-CBC by default), hence no
selectable or builtin authenticated encryption. This made it vulnerable to
padding oracle attacks, particularly with CBC.
References
Assigned-to
mdeslaur
Package
Upstream:released (2.4.25-1)
Ubuntu 17.10 (Artful Aardvark):not-affected (2.4.25-3ubuntu2)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.4.7-1ubuntu4.14)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (2.4.18-2ubuntu3.2)
Ubuntu 17.04 (Zesty Zapus):not-affected (2.4.25-3ubuntu2)
Patches:
Upstream:https://svn.apache.org/viewvc?view=revision&revision=1772812 (trunk)
Upstream:https://svn.apache.org/viewvc?view=revision&revision=1772925 (2.4)
More Information

Updated: 2017-08-11 23:54:11 UTC (commit 13081)