7.5

CVE-2017-7668

The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.

Data is provided by the National Vulnerability Database (NVD)
ApacheHTTP Server Version2.2.32
ApacheHTTP Server Version2.4.24
ApacheHTTP Server Version2.4.25
NetappOncommand Unified Manager Version- SwPlatform7-mode
NetappStoragegrid Version-
RedhatEnterprise Linux Eus Version7.2
RedhatEnterprise Linux Eus Version7.3
RedhatEnterprise Linux Eus Version7.4
RedhatEnterprise Linux Eus Version7.5
RedhatEnterprise Linux Eus Version7.6
RedhatEnterprise Linux Eus Version7.7
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
OracleSecure Global Desktop Version5.3
ApplemacOS X Version < 10.13.1
ApplemacOS X Version >= 10.11.0 < 10.11.6
ApplemacOS X Version >= 10.12.0 < 10.12.6
ApplemacOS X Version10.11.6 Update-
ApplemacOS X Version10.11.6 Updatesecurity_update_2016-001
ApplemacOS X Version10.11.6 Updatesecurity_update_2016-002
ApplemacOS X Version10.11.6 Updatesecurity_update_2016-003
ApplemacOS X Version10.11.6 Updatesecurity_update_2017-001
ApplemacOS X Version10.11.6 Updatesecurity_update_2017-002
ApplemacOS X Version10.11.6 Updatesecurity_update_2017-003
ApplemacOS X Version10.12.6 Update-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 65.46% 0.984
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-125 Out-of-bounds Read

The product reads data past the end, or before the beginning, of the intended buffer.

CWE-126 Buffer Over-read

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.

http://www.securitytracker.com/id/1038711
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/99137
Third Party Advisory
VDB Entry