The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache http server 2.4.25 |
||
apache http server 2.2.32 |
||
apache http server 2.4.24 |
||
netapp storagegrid - |
||
netapp clustered data ontap - |
||
netapp oncommand unified manager - |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux server aus 7.2 |
||
redhat enterprise linux workstation 7.0 |
||
redhat enterprise linux server tus 7.2 |
||
redhat enterprise linux server 7.0 |
||
redhat enterprise linux server tus 7.3 |
||
redhat enterprise linux server aus 7.3 |
||
redhat enterprise linux server aus 7.4 |
||
redhat enterprise linux server tus 7.4 |
||
redhat enterprise linux eus 7.3 |
||
redhat enterprise linux eus 7.4 |
||
redhat enterprise linux eus 7.5 |
||
redhat enterprise linux server tus 7.6 |
||
redhat enterprise linux server aus 7.6 |
||
redhat enterprise linux eus 7.6 |
||
redhat enterprise linux eus 7.2 |
||
redhat enterprise linux server aus 7.7 |
||
redhat enterprise linux server tus 7.7 |
||
redhat enterprise linux eus 7.7 |
||
debian debian linux 8.0 |
||
debian debian linux 9.0 |
||
oracle secure global desktop 5.3 |
||
apple mac os x |
||
apple mac os x 10.11.6 |
||
apple mac os x 10.12.6 |
And that's the worst of ten patches awaiting lucky, lucky SAP admins
SAP has issued its April security update, which brings a waiting world news of ten patch-worthy problems. The nastiest has a CVSS rating of 9.8 and impacts SAP's Business Client, the desktop tool to access much of its wares. Details of the problem are behind a registration wall, but according to ERP Scan, the vulnerability is a memory corruption bug that allows an attacker to inject crafted code into working memory. The outcome can be "complete control” over the application, denial of service,...