Bug 1406753 (CVE-2016-2161) - CVE-2016-2161 httpd: DoS vulnerability in mod_auth_digest
Summary: CVE-2016-2161 httpd: DoS vulnerability in mod_auth_digest
Status: CLOSED ERRATA
Alias: CVE-2016-2161
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20161220,repor...
Keywords: Security
Depends On: 1406823 1412975 1412976 1425463
Blocks: 1406828 1457678
TreeView+ depends on / blocked
 
Reported: 2016-12-21 12:09 UTC by Adam Mariš
Modified: 2019-06-08 21:40 UTC (History)
40 users (show)

(edit)
It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.
Clone Of:
(edit)
Last Closed: 2017-07-13 05:30:43 UTC


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:0906 normal SHIPPED_LIVE Moderate: httpd security and bug fix update 2017-04-12 16:24:45 UTC
Red Hat Product Errata RHSA-2017:1161 normal SHIPPED_LIVE Moderate: httpd24-httpd security, bug fix, and enhancement update 2017-04-26 14:19:21 UTC
Red Hat Product Errata RHSA-2017:1413 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 7 2017-06-07 21:54:35 UTC
Red Hat Product Errata RHSA-2017:1414 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6 2017-06-07 21:54:17 UTC
Red Hat Product Errata RHSA-2017:1415 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 2017-06-07 21:43:43 UTC

Description Adam Mariš 2016-12-21 12:09:03 UTC
It was found that malicious input to mod_auth_digest will cause the server to crash, and each instance continues to crash even for subsequently valid requests.

Affects versions 2.4.x up to 2.4.23

External Reference:

https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25

Comment 1 Adam Mariš 2016-12-21 15:04:41 UTC
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 1406823]

Comment 7 Tomas Hoger 2017-02-21 11:26:56 UTC
Upstream commit:

http://svn.apache.org/viewvc?view=revision&revision=1773069

Comment 9 errata-xmlrpc 2017-04-12 12:31:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:0906

Comment 10 errata-xmlrpc 2017-04-26 10:23:09 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS

Via RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1161

Comment 11 errata-xmlrpc 2017-06-07 17:45:27 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2017:1415 https://access.redhat.com/errata/RHSA-2017:1415

Comment 12 errata-xmlrpc 2017-06-07 17:57:07 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 6

Via RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1414

Comment 13 errata-xmlrpc 2017-06-07 17:59:54 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7

Via RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1413


Note You need to log in before you can comment on or make changes to this bug.