Bug 1493056 (CVE-2017-12171)

Summary: CVE-2017-12171 httpd: # character matches all IPs
Product: [Other] Security Response Reporter: Stefan Cornelius <scorneli>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: apintea, bkundal, bmaxwell, cdewolf, chazlett, csutherl, darran.lofthouse, dimitris, dosoudil, fgavrilo, gzaronik, hhorak, jawilson, jclere, jdoyle, jkaluza, jondruse, jorton, jshepherd, lgao, luhliari, mbabacek, mturk, myarboro, pahan, pgier, pjurak, ppalaga, psakar, psampaio, pslavice, rnetuka, rstancel, rsvoboda, security-response-team, sstavrev, twalsh, vtunka, weli
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-10-24 11:46:51 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1493060, 1493061    
Bug Blocks: 1490435    

Description Stefan Cornelius 2017-09-19 09:24:09 UTC
httpd in RHEL 6.9 does not properly parse comments, resulting in the '#' character in "Allow" statements to accidentally match all IP addresses. This can lead to a bypass of intended security restrictions.

https://bugzilla.redhat.com/show_bug.cgi?id=1489849

Comment 1 Stefan Cornelius 2017-09-19 09:24:12 UTC
Acknowledgments:

Name: KAWAHARA Masashi

Comment 8 errata-xmlrpc 2017-10-19 15:27:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:2972 https://access.redhat.com/errata/RHSA-2017:2972