Severity
7.5HIGH
EPSS
66.4%
top 1.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 20
Latest updateApr 30

Description

The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages8 packages

NVDapache/http_server2.2.32, 2.4.24, 2.4.25+2
CVEListV5apache_software_foundation/apache_http_server2.2.32, 2.4.24, 2.4.25+1
Debianapache2< 2.4.25-4+3
NVDapple/mac_os_x10.11.010.11.6+4

Also affects: Debian Linux 8.0, 9.0, Enterprise Linux 7.2, 7.3, 7.4, 7.5, 7.6, 7.7

Patches

🔴Vulnerability Details

5
GHSA
GHSA-mcc7-rcr3-2rgr: The HTTP strict parsing changes added in Apache httpd 22022-04-30
OSV
apache2 vulnerabilities2017-06-26
OSV
CVE-2017-7668: The HTTP strict parsing changes added in Apache httpd 22017-06-20
CVEList
CVE-2017-7668: The HTTP strict parsing changes added in Apache httpd 22017-06-20
VulnCheck
Apache HTTP Server Buffer Over-read2017

📋Vendor Advisories

5
Apple
CVE-2017-7668: macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan2017-10-31
Ubuntu
Apache HTTP Server vulnerabilities2017-07-31
Ubuntu
Apache HTTP Server vulnerabilities2017-06-26
Red Hat
httpd: ap_find_token() buffer overread2017-06-20
Debian
CVE-2017-7668: apache2 - The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduc...2017

💬Community

3
HackerOne
ap_find_token() Buffer Overread2017-08-10
Bugzilla
CVE-2017-7668 httpd: ap_find_token() buffer overread2017-06-20
Bugzilla
CVE-2017-3167 CVE-2017-3169 CVE-2017-7659 CVE-2017-7668 CVE-2017-7679 httpd: various flaws [fedora-all]2017-06-20
CVE-2017-7668 (HIGH CVSS 7.5) | The HTTP strict parsing changes add | cvebase.io