vulnerability

FreeBSD: VID-0c2db2aa-5584-11e7-9a7d-b499baebfeaf (CVE-2017-7679): Apache httpd -- several vulnerabilities

Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jun 20, 2017
Added
Jun 21, 2017
Modified
Dec 10, 2025

Description

The Apache httpd project reports: ap_get_basic_auth_pw() Authentication Bypass (CVE-2017-3167): Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed. mod_ssl Null Pointer Dereference (CVE-2017-3169):mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port. mod_http2 Null Pointer Dereference (CVE-2017-7659): A maliciously constructed HTTP/2 request could cause mod_http2 to dereference a NULL pointer and crash the server process. ap_find_token() Buffer Overread (CVE-2017-7668):The HTTP strict parsing changes added in 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. mod_mime Buffer Overread (CVE-2017-7679):mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.

Solutions

freebsd-upgrade-package-apache22freebsd-upgrade-package-apache24
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.