CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
90.6%
Package : apache2
Version : 2.2.22-13+deb7u13
CVE ID : CVE-2017-15710 CVE-2018-1301 CVE-2018-1312
Debian Bug :
Several vulnerabilities have been found in the Apache HTTPD server.
CVE-2017-15710
Alex Nichols and Jakob Hirsch reported that mod_authnz_ldap, if
configured with AuthLDAPCharsetConfig, could cause an of bound write
if supplied with a crafted Accept-Language header. This could
potentially be used for a Denial of Service attack.
CVE-2018-1301
Robert Swiecki reported that a specially crafted request could have
crashed the Apache HTTP Server, due to an out of bound access after
a size limit is reached by reading the HTTP header.
CVE-2018-1312
Nicolas Daniels discovered that when generating an HTTP Digest
authentication challenge, the nonce sent by mod_auth_digest to
prevent reply attacks was not correctly generated using a
pseudo-random seed. In a cluster of servers using a common Digest
authentication configuration, HTTP requests could be replayed across
servers by an attacker without detection.
For Debian 7 "Wheezy", these problems have been fixed in version
2.2.22-13+deb7u13.
We recommend that you upgrade your apache2 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | mips | apache2-mpm-itk | < 2.4.10-10+deb8u12 | apache2-mpm-itk_2.4.10-10+deb8u12_mips.deb |
Debian | 8 | powerpc | apache2-bin | < 2.4.10-10+deb8u12 | apache2-bin_2.4.10-10+deb8u12_powerpc.deb |
Debian | 8 | ppc64el | apache2-bin | < 2.4.10-10+deb8u12 | apache2-bin_2.4.10-10+deb8u12_ppc64el.deb |
Debian | 7 | armel | apache2 | < 2.2.22-13+deb7u13 | apache2_2.2.22-13+deb7u13_armel.deb |
Debian | 9 | mips64el | apache2-suexec-pristine | < 2.4.25-3+deb9u4 | apache2-suexec-pristine_2.4.25-3+deb9u4_mips64el.deb |
Debian | 7 | armel | apache2.2-bin | < 2.2.22-13+deb7u13 | apache2.2-bin_2.2.22-13+deb7u13_armel.deb |
Debian | 8 | mipsel | apache2.2-bin | < 2.4.10-10+deb8u12 | apache2.2-bin_2.4.10-10+deb8u12_mipsel.deb |
Debian | 8 | mipsel | libapache2-mod-macro | < 1:2.4.10-10+deb8u12 | libapache2-mod-macro_1:2.4.10-10+deb8u12_mipsel.deb |
Debian | 8 | armel | apache2-suexec-custom | < 2.4.10-10+deb8u12 | apache2-suexec-custom_2.4.10-10+deb8u12_armel.deb |
Debian | 8 | mipsel | apache2-dbg | < 2.4.10-10+deb8u12 | apache2-dbg_2.4.10-10+deb8u12_mipsel.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
90.6%