Red Hat Bugzilla – Bug 1560634
CVE-2018-1312 httpd: Weak Digest auth nonce generation in mod_auth_digest
Last modified: 2018-10-25 13:28:42 EDT
When generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection. Versions Affected: httpd 2.2.0 to 2.4.29 External references: https://httpd.apache.org/security/vulnerabilities_24.html
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1560635]
Upstream patchset: https://svn.apache.org/viewvc?view=revision&revision=1824481 Upstream bug: https://bz.apache.org/bugzilla/show_bug.cgi?id=54637
Statement: The "AuthType Digest" directive is not enabled in the default httpd configuration as shipped with Red Hat Enterprise Linux, and needs to be explicitly enabled. Therefore this flaw has no impact on the default versions of the httpd package as shipped with Red Hat Enterprise Linux. Also upstream discourages the use of mod_auth_digest because of its inherent security weaknesses and recommends the use of mod_ssl.