Bug 1560634 (CVE-2018-1312) - CVE-2018-1312 httpd: Weak Digest auth nonce generation in mod_auth_digest
Summary: CVE-2018-1312 httpd: Weak Digest auth nonce generation in mod_auth_digest
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-1312
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1560635 1560636 1566317 1566318 1566319 1719722
Blocks: 1560402
TreeView+ depends on / blocked
 
Reported: 2018-03-26 15:41 UTC by Pedro Sampaio
Modified: 2023-10-06 17:45 UTC (History)
31 users (show)

Fixed In Version: httpd 2.4.30
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-06-10 10:18:37 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:3558 0 None None None 2018-11-13 08:36:13 UTC
Red Hat Product Errata RHSA-2019:0366 0 None None None 2019-02-18 16:55:48 UTC
Red Hat Product Errata RHSA-2019:0367 0 None None None 2019-02-18 16:58:29 UTC
Red Hat Product Errata RHSA-2019:1898 0 None None None 2019-07-29 15:15:56 UTC

Description Pedro Sampaio 2018-03-26 15:41:26 UTC
When generating an HTTP Digest authentication challenge, the nonce
sent to prevent reply attacks was not correctly generated using a
pseudo-random seed.  In a cluster of servers using a common Digest
authentication configuration, HTTP requests could be replayed across
servers by an attacker without detection.

Versions Affected:
httpd 2.2.0 to 2.4.29

External references:

https://httpd.apache.org/security/vulnerabilities_24.html

Comment 1 Pedro Sampaio 2018-03-26 15:42:01 UTC
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 1560635]

Comment 5 Huzaifa S. Sidhpurwala 2018-04-12 04:05:19 UTC
Upstream patchset: 
https://svn.apache.org/viewvc?view=revision&revision=1824481

Upstream bug:
https://bz.apache.org/bugzilla/show_bug.cgi?id=54637

Comment 7 Huzaifa S. Sidhpurwala 2018-06-22 04:43:50 UTC
Statement:

The "AuthType Digest" directive is not enabled in the default httpd configuration as shipped with Red Hat Enterprise Linux, and needs to be explicitly enabled. Therefore this flaw has no impact on the default versions of the httpd package as shipped with Red Hat Enterprise Linux. Also upstream discourages the use of mod_auth_digest because of its inherent security weaknesses and recommends the use of mod_ssl.

Comment 11 errata-xmlrpc 2018-11-13 08:36:04 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS

Via RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2018:3558

Comment 12 errata-xmlrpc 2019-02-18 16:55:47 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0366

Comment 13 errata-xmlrpc 2019-02-18 16:58:27 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 6
  JBoss Core Services on RHEL 7

Via RHSA-2019:0367 https://access.redhat.com/errata/RHSA-2019:0367

Comment 15 errata-xmlrpc 2019-07-29 15:15:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2019:1898 https://access.redhat.com/errata/RHSA-2019:1898


Note You need to log in before you can comment on or make changes to this bug.