Red Hat Bugzilla – Bug 1560399
CVE-2018-1303 httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause a denial of service
Last modified: 2018-10-30 19:01:46 EDT
Apache HTTP Server (httpd) through version 2.4.29 is vulnerable to an out of bounds read in the mod_cache_socache.c:read_table() function. A remote attacker could exploit this to cause a denial of service. Upstream Advisory: https://httpd.apache.org/security/vulnerabilities_24.html Upstream Patch: https://svn.apache.org/viewvc?view=revision&sortby=log&revision=1824475
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1560400]
Analysis: If the apache server is configured to use mod_cache, a client could send a specially crafted http header, causing the process to crash. Apache is by default configured in prefork MPM mode, which means that this flaw can result in a crash of child process. The main web server process will not be killed.
Statement: The versions of httpd package shipped with Red Hat Enterprise Linux are by default configured in prefork MPM mode, which means that this flaw can result in a crash of child process. The main web server process will not be killed. Also, though the module is loaded by default, it needs to be specifically enabled in order to be exposed to the security flaw.