National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2017-3169 Detail

Current Description

In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.

Source:  MITRE
View Analysis Description

Severity



CVSS 3.x Severity and Metrics:

NIST CVSS score
NIST: NVD
Base Score: 9.8 CRITICAL
Vector:  CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99134 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038711 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84bf7fcc5cad35d355f11839cbdd13cbc5ffc1d34675090bff0f96ae@%3Cdev.httpd.apache.org%3E Patch Vendor Advisory
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://www.nomachine.com/SU08O00185 Mitigation Third Party Advisory
https://www.tenable.com/security/tns-2019-09

Weakness Enumeration

CWE-ID CWE Name Source
CWE-476 NULL Pointer Dereference NIST   Apache Software Foundation  

Known Affected Software Configurations Switch to CPE 2.2

Configuration 1 ( hide )
 cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.24:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.25:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.26:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.27:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.29:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.30:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.31:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.2.32:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*
     Show Matching CPE(s)


Change History

18 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2017-3169
NVD Published Date:
06/19/2017
NVD Last Modified:
02/07/2019