How to verify "Apache HTTP Server mod_mime Buffer Overread" has been fixed in CentOS 7
Posted: 2018/10/30 04:09:56
Hi Experts,
"Apache HTTP Server mod_mime Buffer Overread" vulnerability has been found in my CentOS 7, I have updated system using yum update.
My question is how to verify the problem is fixed. following is the detailed information about the vulnerability:
--------------------------------------------------------------------------------
Apache httpd 2.4.26 https://httpd.apache.org/security/vulne ... es_24.html
The Apache Module mod_mime is used to assign content metadata to the content selected for an HTTP response by mapping patterns in the URI or filenames to the metadata values.In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.QID Detection Logic (Unauthenticated):This QID matches vulnerable versions based on the exposed banner information under the HTTP service.
A remote attacker could exploit this vulnerability to read one byte past the end of a buffer which could affect the confidentiality, integrity and availability of data on the target system.
These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.27 Changelog, Apache httpd 2.2.34 Changelog,
Patch: Following are links for downloading patches to fix the vulnerabilities: CVE-2017-7679: Apache 2.2.x CVE-2017-7679: Apache 2.4.x
--------------------------------------------------------------------------------
Thank you very much.
Best Regards
"Apache HTTP Server mod_mime Buffer Overread" vulnerability has been found in my CentOS 7, I have updated system using yum update.
My question is how to verify the problem is fixed. following is the detailed information about the vulnerability:
--------------------------------------------------------------------------------
Apache httpd 2.4.26 https://httpd.apache.org/security/vulne ... es_24.html
The Apache Module mod_mime is used to assign content metadata to the content selected for an HTTP response by mapping patterns in the URI or filenames to the metadata values.In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.QID Detection Logic (Unauthenticated):This QID matches vulnerable versions based on the exposed banner information under the HTTP service.
A remote attacker could exploit this vulnerability to read one byte past the end of a buffer which could affect the confidentiality, integrity and availability of data on the target system.
These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.27 Changelog, Apache httpd 2.2.34 Changelog,
Patch: Following are links for downloading patches to fix the vulnerabilities: CVE-2017-7679: Apache 2.2.x CVE-2017-7679: Apache 2.4.x
--------------------------------------------------------------------------------
Thank you very much.
Best Regards