National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2017-9788 Detail

Current Description

In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.

Source:  MITRE      Last Modified:  07/13/2017      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2017-9788
Original release date:
07/13/2017
Last revised:
01/04/2018
Source:
US-CERT/NIST

Impact

CVSS Severity (version 3.0):
CVSS v3 Base Score:
9.1 Critical
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H (legend)
Impact Score:
5.2
Exploitability Score:
3.9
CVSS Version 3 Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
None
Availability (A):
High
CVSS Severity (version 2.0):
CVSS v2 Base Score:
6.4 MEDIUM
Vector:
(AV:N/AC:L/Au:N/C:P/I:N/A:P) (legend)
Impact Subscore:
4.9
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://www.debian.org/security/2017/dsa-3913 External Source DEBIAN DSA-3913
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html External Source CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99569 Third Party Advisory; VDB Entry External Source BID 99569
http://www.securitytracker.com/id/1038906 Third Party Advisory; VDB Entry External Source SECTRACK 1038906
https://access.redhat.com/errata/RHSA-2017:2478 External Source REDHAT RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479 External Source REDHAT RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483 External Source REDHAT RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:2708 External Source REDHAT RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709 External Source REDHAT RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710 External Source REDHAT RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113 External Source REDHAT RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114 External Source REDHAT RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3193 External Source REDHAT RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194 External Source REDHAT RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195 External Source REDHAT RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3239 External Source REDHAT RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240 External Source REDHAT RHSA-2017:3240
https://httpd.apache.org/security/vulnerabilities_22.html Vendor Advisory External Source CONFIRM https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html Vendor Advisory External Source CONFIRM https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E Mailing List; Mitigation; Vendor Advisory External Source MLIST [announce] 20170713 CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest
https://security.gentoo.org/glsa/201710-32 External Source GENTOO GLSA-201710-32
https://security.netapp.com/advisory/ntap-20170911-0002/ External Source CONFIRM https://security.netapp.com/advisory/ntap-20170911-0002/
https://support.apple.com/HT208221 External Source CONFIRM https://support.apple.com/HT208221

Technical Details

Vulnerability Type (View All)

  • Input Validation (CWE-20)
  • Information Leak / Disclosure (CWE-200)

Change History 11 change records found - show changes