svn commit: r443943 - head/security/vuxml
Bernard Spil
brnrd at FreeBSD.org
Tue Jun 20 07:05:16 UTC 2017
Author: brnrd
Date: Tue Jun 20 07:05:14 2017
New Revision: 443943
URL: https://svnweb.freebsd.org/changeset/ports/443943
Log:
security/vuxml: Document Apache httpd vulnerabilities
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Tue Jun 20 06:30:23 2017 (r443942)
+++ head/security/vuxml/vuln.xml Tue Jun 20 07:05:14 2017 (r443943)
@@ -58,6 +58,62 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="0c2db2aa-5584-11e7-9a7d-b499baebfeaf">
+ <topic>Apache httpd -- several vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>apache22</name>
+ <range><lt>2.2.32</lt></range>
+ </package>
+ <package>
+ <name>apache24</name>
+ <range><lt>2.4.26</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Apache httpd project reports:</p>
+ <blockquote cite="http://httpd.apache.org/security/vulnerabilities_24.html">
+ <ul>
+ <li>ap_get_basic_auth_pw() Authentication Bypass (CVE-2017-3167):<br/>
+ Use of the ap_get_basic_auth_pw() by third-party modules outside
+ of the authentication phase may lead to authentication requirements
+ being bypassed.</li>
+ <li>mod_ssl Null Pointer Dereference (CVE-2017-3169):<br/>mod_ssl may
+ dereference a NULL pointer when third-party modules
+ call ap_hook_process_connection() during an HTTP request to an HTTPS
+ port.</li>
+ <li>mod_http2 Null Pointer Dereference (CVE-2017-7659):<br/> A maliciously
+ constructed HTTP/2 request could cause mod_http2 to dereference a NULL
+ pointer and crash the server process.</li>
+ <li>ap_find_token() Buffer Overread (CVE-2017-7668):<br/>The HTTP strict
+ parsing changes added in 2.2.32 and 2.4.24 introduced a bug in token
+ list parsing, which allows ap_find_token() to search past the end of its
+ input string. By maliciously crafting a sequence of request headers, an
+ attacker may be able to cause a segmentation fault, or to force
+ ap_find_token() to return an incorrect value.</li>
+ <li>mod_mime Buffer Overread (CVE-2017-7679):<br/>mod_mime can read one
+ byte past the end of a buffer when sending a malicious Content-Type
+ response header.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://httpd.apache.org/security/vulnerabilities_24.html</url>
+ <url>https://httpd.apache.org/security/vulnerabilities_22.html</url>
+ <cvename>CVE-2017-3167</cvename>
+ <cvename>CVE-2017-3169</cvename>
+ <cvename>CVE-2017-7659</cvename>
+ <cvename>CVE-2017-7668</cvename>
+ <cvename>CVE-2017-7679</cvename>
+ </references>
+ <dates>
+ <discovery>2017-06-20</discovery>
+ <entry>2017-06-20</entry>
+ </dates>
+ </vuln>
+
<vuln vid="f53dd5cc-527f-11e7-a772-e8e0b747a45a">
<topic>chromium -- multiple vulnerabilities</topic>
<affects>
@@ -7090,7 +7146,7 @@ Notes:
<topic>Apache httpd -- several vulnerabilities</topic>
<affects>
<package>
- <name>apache24</name>
+ <name>APAche24</name>
<range><lt>2.4.25</lt></range>
</package>
</affects>
More information about the svn-ports-head
mailing list