Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1406753 - (CVE-2016-2161) CVE-2016-2161 httpd: DoS vulnerability in mod_auth_digest
CVE-2016-2161 httpd: DoS vulnerability in mod_auth_digest
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20161220,repor...
: Security
Depends On: 1406823 1412975 1412976 1425463
Blocks: 1406828 1457678
  Show dependency treegraph
 
Reported: 2016-12-21 07:09 EST by Adam Mariš
Modified: 2017-07-13 01:30 EDT (History)
40 users (show)

See Also:
Fixed In Version: httpd 2.4.25
Doc Type: If docs needed, set a value
Doc Text:
It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-07-13 01:30:43 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:0906 normal SHIPPED_LIVE Moderate: httpd security and bug fix update 2017-04-12 12:24:45 EDT
Red Hat Product Errata RHSA-2017:1161 normal SHIPPED_LIVE Moderate: httpd24-httpd security, bug fix, and enhancement update 2017-04-26 10:19:21 EDT
Red Hat Product Errata RHSA-2017:1413 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 7 2017-06-07 17:54:35 EDT
Red Hat Product Errata RHSA-2017:1414 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6 2017-06-07 17:54:17 EDT
Red Hat Product Errata RHSA-2017:1415 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 2017-06-07 17:43:43 EDT

  None (edit)
Description Adam Mariš 2016-12-21 07:09:03 EST
It was found that malicious input to mod_auth_digest will cause the server to crash, and each instance continues to crash even for subsequently valid requests.

Affects versions 2.4.x up to 2.4.23

External Reference:

https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
Comment 1 Adam Mariš 2016-12-21 10:04:41 EST
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 1406823]
Comment 7 Tomas Hoger 2017-02-21 06:26:56 EST
Upstream commit:

http://svn.apache.org/viewvc?view=revision&revision=1773069
Comment 9 errata-xmlrpc 2017-04-12 08:31:52 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:0906
Comment 10 errata-xmlrpc 2017-04-26 06:23:09 EDT
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS

Via RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1161
Comment 11 errata-xmlrpc 2017-06-07 13:45:27 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2017:1415 https://access.redhat.com/errata/RHSA-2017:1415
Comment 12 errata-xmlrpc 2017-06-07 13:57:07 EDT
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 6

Via RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1414
Comment 13 errata-xmlrpc 2017-06-07 13:59:54 EDT
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7

Via RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1413

Note You need to log in before you can comment on or make changes to this bug.