Welcome to Our Community

While Linux.org has been around for a while, we recently changed management and had to purge most of the content (including users). If you signed up before April 23rd please sign up again. Thanks!

Ubuntu Security Update USN-3279-1: Apache HTTP Server vulnerabilities

Discussion in 'Linux Security Announcements (Automated)' started by LinuxBot, May 9, 2017.

  1. LinuxBot

    LinuxBot Moderator
    Staff Member

    Joined:
    Apr 25, 2017
    Messages:
    30
    Likes Received:
    0
    Ubuntu Security Notice USN-3279-1


    9th May, 2017

    apache2 vulnerabilities


    A security issue affects these releases of Ubuntu and its derivatives:

    • Ubuntu 16.10
    • Ubuntu 16.04 LTS
    • Ubuntu 14.04 LTS
    Summary


    Several security issues were fixed in Apache HTTP Server.

    Software description

    • apache2 - Apache HTTP server
    Details


    It was discovered that the Apache mod_session_crypto module was encrypting
    data and cookies using either CBC or ECB modes. A remote attacker could
    possibly use this issue to perform padding oracle attacks. (CVE-2016-0736)

    Maksim Malyutin discovered that the Apache mod_auth_digest module
    incorrectly handled malicious input. A remote attacker could possibly use
    this issue to cause Apache to crash, resulting in a denial of service.
    (CVE-2016-2161)

    David Dennerline and RĂ©gis Leroy discovered that the Apache HTTP Server
    incorrectly handled unusual whitespace when parsing requests, contrary to
    specifications. When being used in combination with a proxy or backend
    server, a remote attacker could possibly use this issue to perform an
    injection attack and pollute cache. This update may introduce compatibility
    issues with clients that do not strictly follow HTTP protocol
    specifications. A new configuration option "HttpProtocolOptions Unsafe" can
    be used to revert to the previous unsafe behaviour in problematic
    environments. (CVE-2016-8743)

    Update instructions


    The problem can be corrected by updating your system to the following package version:

    Ubuntu 16.10:
    apache2-bin 2.4.18-2ubuntu4.1
    Ubuntu 16.04 LTS:
    apache2-bin 2.4.18-2ubuntu3.2
    Ubuntu 14.04 LTS:
    apache2-bin 2.4.7-1ubuntu4.14

    To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

    In general, a standard system update will make all the necessary changes.

    References


    CVE-2016-0736, CVE-2016-2161, CVE-2016-8743

    Continue reading...
     

Share This Page