
CVE-2017-7679 – httpd: mod_mime buffer overread
https://notcve.org/view.php?id=CVE-2017-7679
20 Jun 2017 — In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header. En Apache httpd, en versiones 2.2.x anteriores a la 2.2.33 y versiones 2.4.x anteriores a la 2.4.26, mod_mime puede leer un byte más allá del final de un búfer cuando está enviando una cabecera de respuesta del tipo Content maliciosa. A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME con... • http://www.debian.org/security/2017/dsa-3896 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •

CVE-2017-3167 – httpd: ap_get_basic_auth_pw() authentication bypass
https://notcve.org/view.php?id=CVE-2017-3167
20 Jun 2017 — In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed. En Apache httpd, en versiones 2.2.x anteriores a la 2.2.33 y versiones 2.4.x anteriores a la 2.4.26, el uso de ap_get_basic_auth_pw() por parte de módulos de terceros fuera de la fase de autenticación puede dar lugar a que se omitan requisitos de autenticación.. It was discovered that the use of httpd... • http://www.debian.org/security/2017/dsa-3896 • CWE-287: Improper Authentication •

CVE-2016-8743 – httpd: Apache HTTP Request Parsing Whitespace Defects
https://notcve.org/view.php?id=CVE-2016-8743
25 Dec 2016 — Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. El servidor HTTP Apache, en todas las distribuciones... • http://rhn.redhat.com/errata/RHSA-2017-1415.html • CWE-20: Improper Input Validation •

CVE-2016-2161 – httpd: DoS vulnerability in mod_auth_digest
https://notcve.org/view.php?id=CVE-2016-2161
25 Dec 2016 — In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests. En Apache HTTP Server versiones 2.4.0 hasta 2.4.23, una entrada maliciosa a mod_auth_digest puede causar que el servidor se bloquee y cada instancia continúa bloqueado incluso para las peticiones válidas posteriormente. It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation... • http://rhn.redhat.com/errata/RHSA-2017-1415.html • CWE-20: Improper Input Validation CWE-823: Use of Out-of-range Pointer Offset •

CVE-2016-0736 – Apache mod_session_crypto - Padding Oracle
https://notcve.org/view.php?id=CVE-2016-0736
23 Dec 2016 — In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC. En Apache HTTP Server versiones 2.4.0 hasta 2.4.23, mod_session_crypto fue cifraba su cookie y datos utilizando los cifrados configurados posiblemente con los modos de operación ... • https://packetstorm.news/files/id/140265 • CWE-287: Improper Authentication CWE-310: Cryptographic Issues •

CVE-2016-8612 – mod_cluster: Protocol parsing logic error
https://notcve.org/view.php?id=CVE-2016-8612
16 Dec 2016 — Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process. Apache HTTP Server mod_cluster, en versiones anteriores a httpd 2.4.23, es vulnerable a una validación de entradas incorrecta en la lógica de análisis de protocolo en el balanceador de carga, lo que resulta en un fallo de segmentación en el proceso httpd en servicio. An error was found in pr... • http://rhn.redhat.com/errata/RHSA-2016-2957.html • CWE-20: Improper Input Validation •

CVE-2016-8740 – Apache 2.4.23 mod_http2 - Denial of Service
https://notcve.org/view.php?id=CVE-2016-8740
05 Dec 2016 — The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request. El módulo mod_http2 en el Apache HTTP Server 2.4.17 hasta la versión 2.4.23, cuando la configuración Protocols incluye h2 o h2c, no restringe la longitud de la cabecera de petición, lo que permite a atacantes remot... • https://www.exploit-db.com/exploits/40909 • CWE-20: Improper Input Validation CWE-399: Resource Management Errors CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2016-5387 – HTTPD: sets environmental variable based on user supplied Proxy request header
https://notcve.org/view.php?id=CVE-2016-5387
18 Jul 2016 — The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID fo... • http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html • CWE-20: Improper Input Validation •

CVE-2016-1546 – httpd: mod_http2 denial-of-service by thread starvation
https://notcve.org/view.php?id=CVE-2016-1546
06 Jul 2016 — The Apache HTTP Server 2.4.17 and 2.4.18, when mod_http2 is enabled, does not limit the number of simultaneous stream workers for a single HTTP/2 connection, which allows remote attackers to cause a denial of service (stream-processing outage) via modified flow-control windows. El servidor HTTP Apache 2.4.17 y 2.4.18, cuando mod_http2 está activado, no limita el número de trabajadores de flujo simultáneos para una sola conexión HTTP/2, lo que permite a atacantes remotos provocar una denegación de servicio (... • http://httpd.apache.org/security/vulnerabilities_24.html • CWE-399: Resource Management Errors •

CVE-2016-4979 – httpd: X509 client certificate authentication bypass using HTTP/2
https://notcve.org/view.php?id=CVE-2016-4979
05 Jul 2016 — The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation. El servidor HTTP Apache 2.4.18 hasta la versión 2.4.20, cuando mod_http2 y mod_ssl están activados, no reconoce adecuadamente la directiva "SSLVerif... • http://httpd.apache.org/security/vulnerabilities_24.html • CWE-284: Improper Access Control CWE-287: Improper Authentication •