Bug 1406744 (CVE-2016-0736)

Summary: CVE-2016-0736 httpd: Padding Oracle in Apache mod_session_crypto
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: apmukher, bbaranow, bkundal, bmaxwell, carnil, cdewolf, csutherl, dandread, darran.lofthouse, dosoudil, fnasser, gzaronik, hhorak, huwang, jason.greene, jawilson, jboss-set, jclere, jdoyle, jkaluza, jorton, lgao, luhliari, mbabacek, mdshaikh, me, mfrodl, mturk, myarboro, pahan, pgier, pragshar, psakar, pslavice, rmeggins, rnetuka, rsvoboda, sardella, twalsh, vtunka, weli
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: httpd 2.4.25 Doc Type: If docs needed, set a value
Doc Text:
It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-07-13 05:30:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1406823, 1412975, 1412976, 1425463    
Bug Blocks: 1406828, 1457678    

Description Adam Mariš 2016-12-21 11:33:21 UTC
It was found that session data/cookies presented to mod_session_crypto were not authenticated that can lead to deciphering or tampering with a padding oracle attack.

Affects version 2.4.x up to 2.4.23

External References:

https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt

Comment 1 Adam Mariš 2016-12-21 15:04:55 UTC
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 1406823]

Comment 2 Andrej Nemec 2016-12-23 13:12:02 UTC
References:

http://seclists.org/fulldisclosure/2016/Dec/74

Comment 7 Tomas Hoger 2017-02-21 11:16:05 UTC
Upstream commit:

http://svn.apache.org/viewvc?view=revision&revision=1772925

Comment 9 errata-xmlrpc 2017-04-12 12:31:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:0906

Comment 10 errata-xmlrpc 2017-04-26 10:22:51 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS

Via RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1161

Comment 11 errata-xmlrpc 2017-06-07 17:45:02 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2017:1415 https://access.redhat.com/errata/RHSA-2017:1415

Comment 12 errata-xmlrpc 2017-06-07 17:56:46 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 6

Via RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1414

Comment 13 errata-xmlrpc 2017-06-07 17:59:31 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7

Via RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1413