Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1560399 - (CVE-2018-1303) CVE-2018-1303 httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause a denial of service
CVE-2018-1303 httpd: Out of bounds read in mod_cache_socache can allow a remo...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180321,repor...
: Security
Depends On: 1560404 1565457 1565458 1565459 1560400
Blocks: 1560402
  Show dependency treegraph
 
Reported: 2018-03-26 00:43 EDT by Sam Fowler
Modified: 2018-10-30 19:01 EDT (History)
51 users (show)

See Also:
Fixed In Version: httpd 2.4.30
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Sam Fowler 2018-03-26 00:43:12 EDT
Apache HTTP Server (httpd) through version 2.4.29 is vulnerable to an out of bounds read in the mod_cache_socache.c:read_table() function. A remote attacker could exploit this to cause a denial of service.


Upstream Advisory:

https://httpd.apache.org/security/vulnerabilities_24.html


Upstream Patch:

https://svn.apache.org/viewvc?view=revision&sortby=log&revision=1824475
Comment 1 Sam Fowler 2018-03-26 00:43:29 EDT
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 1560400]
Comment 5 Huzaifa S. Sidhpurwala 2018-04-10 00:40:18 EDT
Analysis:

If the apache server is configured to use mod_cache, a client could send a specially crafted http header, causing the process to crash. Apache is by default configured in prefork MPM mode, which means that this flaw can result in a crash of child process. The main web server process will not be killed.
Comment 8 Huzaifa S. Sidhpurwala 2018-06-22 00:53:54 EDT
Statement:

The versions of httpd package shipped with Red Hat Enterprise Linux are by default configured in prefork MPM mode, which means that this flaw can result in a crash of child process. The main web server process will not be killed. Also, though the module is loaded by default, it needs to be specifically enabled in order to be exposed to the security flaw.

Note You need to log in before you can comment on or make changes to this bug.