Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1375968 - (CVE-2016-4975) CVE-2016-4975 httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir
CVE-2016-4975 httpd: CRLF injection allowing HTTP response splitting attacks ...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180814,repor...
: Security
Depends On: 1375970 1375971 1624693
Blocks: 1441206
  Show dependency treegraph
 
Reported: 2016-09-14 07:27 EDT by Timothy Walsh
Modified: 2018-10-31 23:16 EDT (History)
42 users (show)

See Also:
Fixed In Version: httpd 2.2.32, httpd 2.4.25
Doc Type: If docs needed, set a value
Doc Text:
It was found that Apache was vulnerable to a HTTP response splitting attack for sites which use mod_userdir. An attacker could use this flaw to inject CRLF characters into the HTTP header and could possibly gain access to secure data.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Timothy Walsh 2016-09-14 07:27:50 EDT
Apache httpd before versions 2.2.32 and 2.4.25 are vulnerable to possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value.
Comment 11 Timothy Walsh 2018-08-21 04:45:34 EDT
The recent release of Red Hat JBoss Core Services Apache HTTP Server 2.4.29 contained the fix for CVE-2016-4975.
Comment 12 Huzaifa S. Sidhpurwala 2018-09-03 01:42:04 EDT
Upstream patch:

https://svn.apache.org/viewvc?view=revision&revision=1777405 (This contains commits for some other non-security issues as well)
Comment 14 mkoepke 2018-10-17 12:28:27 EDT
Is this CVE not going to be security backported to Apache HTTP Server 2.2.15?   It is getting flagged in security scans for RHEL6/Centos6 deployments as they use HTTP 2.2.
Comment 15 Sam Fowler 2018-10-17 19:44:55 EDT
In reply to comment #14:
> Is this CVE not going to be security backported to Apache HTTP Server
> 2.2.15?   It is getting flagged in security scans for RHEL6/Centos6
> deployments as they use HTTP 2.2.

RHEL 6 is currently in Maintenance Support Phase 2:

> During the Maintenance Support 2 Phase, Critical impact Security Advisories (RHSAs) and 
> selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available. 
> Other errata advisories may be delivered as appropriate.

As this flaw has been rated Moderate, it is unlikely to receive a fix in RHEL 6. Please direct further support related queries to <secalert@redhat.com>.

https://access.redhat.com/support/policy/updates/errata/#Maintenance_Support_2_Phase

Note You need to log in before you can comment on or make changes to this bug.