Bug 1406744 (CVE-2016-0736) - CVE-2016-0736 httpd: Padding Oracle in Apache mod_session_crypto
Summary: CVE-2016-0736 httpd: Padding Oracle in Apache mod_session_crypto
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-0736
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1406823 1412975 1412976 1425463
Blocks: 1406828 1457678
TreeView+ depends on / blocked
 
Reported: 2016-12-21 11:33 UTC by Adam Mariš
Modified: 2021-02-17 02:51 UTC (History)
41 users (show)

Fixed In Version: httpd 2.4.25
Doc Type: If docs needed, set a value
Doc Text:
It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.
Clone Of:
Environment:
Last Closed: 2017-07-13 05:30:56 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:0906 0 normal SHIPPED_LIVE Moderate: httpd security and bug fix update 2017-04-12 16:24:45 UTC
Red Hat Product Errata RHSA-2017:1161 0 normal SHIPPED_LIVE Moderate: httpd24-httpd security, bug fix, and enhancement update 2017-04-26 14:19:21 UTC
Red Hat Product Errata RHSA-2017:1413 0 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 7 2017-06-07 21:54:35 UTC
Red Hat Product Errata RHSA-2017:1414 0 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6 2017-06-07 21:54:17 UTC
Red Hat Product Errata RHSA-2017:1415 0 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 2017-06-07 21:43:43 UTC

Description Adam Mariš 2016-12-21 11:33:21 UTC
It was found that session data/cookies presented to mod_session_crypto were not authenticated that can lead to deciphering or tampering with a padding oracle attack.

Affects version 2.4.x up to 2.4.23

External References:

https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt

Comment 1 Adam Mariš 2016-12-21 15:04:55 UTC
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 1406823]

Comment 2 Andrej Nemec 2016-12-23 13:12:02 UTC
References:

http://seclists.org/fulldisclosure/2016/Dec/74

Comment 7 Tomas Hoger 2017-02-21 11:16:05 UTC
Upstream commit:

http://svn.apache.org/viewvc?view=revision&revision=1772925

Comment 9 errata-xmlrpc 2017-04-12 12:31:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:0906

Comment 10 errata-xmlrpc 2017-04-26 10:22:51 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS

Via RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1161

Comment 11 errata-xmlrpc 2017-06-07 17:45:02 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2017:1415 https://access.redhat.com/errata/RHSA-2017:1415

Comment 12 errata-xmlrpc 2017-06-07 17:56:46 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 6

Via RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1414

Comment 13 errata-xmlrpc 2017-06-07 17:59:31 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7

Via RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1413


Note You need to log in before you can comment on or make changes to this bug.