<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2020-35452: Apache httpd: mod_auth_digest possible stack overflow by one nul byte
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Christophe JAILLET <jailletc36 () apache org>
Date: Wed, 09 Jun 2021 23:11:00 +0200
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
CVE-2020-35452: mod_auth_digest possible stack overflow by one nul byte
Severity: low
Vendor: The Apache Software Foundation
Versions Affected:
httpd 2.4.0 to 2.4.46
Description:
Apache HTTP Server 2.4.0 to 2.4.46
A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow
being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation
option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero
byte) of the overflow
Mitigation:
None
Credit:
This issue was discovered and reported by GHSL team member @antonio-morales (Antonio Morales)
References:
https://httpd.apache.org/security/vulnerabilities_24.html
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2020-35452: Apache httpd: mod_auth_digest possible stack overflow by one nul byte Christophe JAILLET (Jun 10)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->