CVE-2017-7668

Priority
Medium
Description
The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24
introduced a bug in token list parsing, which allows ap_find_token() to
search past the end of its input string. By maliciously crafting a sequence
of request headers, an attacker may be able to cause a segmentation fault,
or to force ap_find_token() to return an incorrect value.
References
Assigned-to
mdeslaur
Package
Upstream:pending (2.2.33, 2.4.26)
Ubuntu 17.10 (Artful Aardvark):released (2.4.27-2ubuntu2)
Ubuntu 12.04 ESM (Precise Pangolin):released (2.2.22-1ubuntu1.12)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.4.7-1ubuntu4.16)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (2.4.18-2ubuntu3.3)
Ubuntu 17.04 (Zesty Zapus):released (2.4.25-3ubuntu2.1)
Patches:
Upstream:https://www.apache.org/dist/httpd/patches/apply_to_2.2.32/CVE-2017-7668.patch
Upstream:https://github.com/apache/httpd/commit/a585e36e06a53170be6d2d462ceb5b30b8382988 (2.4)
Upstream:https://github.com/apache/httpd/commit/ad581ced12363ce82ffcb16133f236b2e31563e1 (2.2)
More Information

Updated: 2017-08-11 23:55:57 UTC (commit 13081)