CVE-2016-8743
Publication date 22 December 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
Status
Package | Ubuntu Release | Status |
---|---|---|
apache2 | ||
16.04 LTS xenial |
Fixed 2.4.18-2ubuntu3.2
|
|
14.04 LTS trusty |
Fixed 2.4.7-1ubuntu4.15
|
|
Notes
ratliff
Notes from Debian "The fix is not fully backwards compatible so upstream have created a new option to control this behaviour. Affects: 2.2.0 to 2.4.23."
mdeslaur
This fix no longer allows underscores in host names. Debian added a patch to restore the behaviour: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851357 http://mail-archives.apache.org/mod_mbox/httpd-dev/201702.mbox/%3C20170202125319.GA15948%40redhat.com%3E The new configuration option doesn't entirely preserve backwards compatibility: https://bz.apache.org/bugzilla/show_bug.cgi?id=60783
Patch details
Package | Patch details |
---|---|
apache2 |
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3373-1
- Apache HTTP Server vulnerabilities
- 31 July 2017
- USN-3279-1
- Apache HTTP Server vulnerabilities
- 9 May 2017