Vulnerability Description
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | <= 2.2.33 |
| Debian | Debian Linux | 8.0 |
| Apple | Mac Os X | < 10.13.1 |
| Netapp | Oncommand Unified Manager | - |
| Netapp | Storage Automation Store | - |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.2 |
| Redhat | Enterprise Linux Server Eus | 6.7 |
| Redhat | Enterprise Linux Server Tus | 7.2 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Redhat | Jboss Core Services | 1.0 |
| Redhat | Jboss Enterprise Application Platform | 6.0.0 |
| Redhat | Jboss Enterprise Web Server | 2.0.0 |
| Redhat | Enterprise Linux | 6.0 |
| Oracle | Secure Global Desktop | 5.3 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3913Third Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlPatchThird Party Advisory
- http://www.securityfocus.com/bid/99569Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038906Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:2478Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2479Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2483Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2708Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2709Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2710Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:3113Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:3114Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:3193Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:3194Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:3195Third Party Advisory
FAQ
What is CVE-2017-9788?
CVE-2017-9788 is a vulnerability with a CVSS score of 9.1 (CRITICAL). In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assig...
How severe is CVE-2017-9788?
CVE-2017-9788 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-9788?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Debian Debian Linux, Apple Mac Os X, Netapp Oncommand Unified Manager, Netapp Storage Automation Store.