vulnerability
Red Hat JBossEAP: Improper Input Validation (CVE-2017-9788)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:L/Au:N/C:P/I:N/A:P) | Jul 11, 2017 | Sep 19, 2024 | Dec 20, 2024 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Jul 11, 2017
Added
Sep 19, 2024
Modified
Dec 20, 2024
Description
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.. It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CVE-2017-9788
- https://attackerkb.com/topics/CVE-2017-9788
- URL-https://access.redhat.com/security/cve/CVE-2017-9788
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1470748
- URL-https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34
- URL-https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27
- URL-https://access.redhat.com/errata/RHSA-2017:3239
- URL-https://access.redhat.com/errata/RHSA-2017:3240

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.