Emmanuel Dreyfus discovered that third-party modules using the apgetbasicauthpw() function outside of the authentication phase may lead to authentication requirements being bypassed. This update adds a new apgetbasicauthcomponents() function for use by third-party modules. (CVE-2017-3167)
Vasileios Panopoulos discovered that the Apache modssl module may crash when third-party modules call aphookprocessconnection() during an HTTP request to an HTTPS port. (CVE-2017-3169)
Javier Jiménez discovered that the Apache HTTP Server incorrectly handled parsing certain requests. A remote attacker could possibly use this issue to cause the Apache HTTP Server to crash, resulting in a denial of service. (CVE-2017-7668)
ChenQin and Hanno Böck discovered that the Apache mod_mime module incorrectly handled certain Content-Type response headers. A remote attacker could possibly use this issue to cause the Apache HTTP Server to crash, resulting in a denial of service. (CVE-2017-7679)
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "apache2",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2-bin",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2-data",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2-dev",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2-mpm-event",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2-mpm-itk",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2-mpm-prefork",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2-mpm-worker",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2-suexec",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2-suexec-custom",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2-suexec-pristine",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2-utils",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "apache2.2-bin",
"binary_version": "2.4.7-1ubuntu4.16"
},
{
"binary_name": "libapache2-mod-macro",
"binary_version": "1:2.4.7-1ubuntu4.16"
},
{
"binary_name": "libapache2-mod-proxy-html",
"binary_version": "1:2.4.7-1ubuntu4.16"
}
]
}
{
"ecosystem": "Ubuntu:14.04:LTS",
"cves": [
{
"id": "CVE-2017-3167",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-3169",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-7668",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-7679",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "apache2",
"binary_version": "2.4.18-2ubuntu3.3"
},
{
"binary_name": "apache2-bin",
"binary_version": "2.4.18-2ubuntu3.3"
},
{
"binary_name": "apache2-data",
"binary_version": "2.4.18-2ubuntu3.3"
},
{
"binary_name": "apache2-dev",
"binary_version": "2.4.18-2ubuntu3.3"
},
{
"binary_name": "apache2-suexec-custom",
"binary_version": "2.4.18-2ubuntu3.3"
},
{
"binary_name": "apache2-suexec-pristine",
"binary_version": "2.4.18-2ubuntu3.3"
},
{
"binary_name": "apache2-utils",
"binary_version": "2.4.18-2ubuntu3.3"
}
]
}
{
"ecosystem": "Ubuntu:16.04:LTS",
"cves": [
{
"id": "CVE-2017-3167",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-3169",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-7668",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-7679",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
}
]
}