Lucene search

K
redhatcveRedhat.comRH:CVE-2017-9788
HistoryOct 10, 2019 - 10:39 a.m.

CVE-2017-9788

2019-10-1010:39:39
redhat.com
access.redhat.com
34

EPSS

0.468

Percentile

97.5%

It was discovered that the httpd’s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.

Mitigation

If you do not use digest authentication, do not load the "auth_digest_module".

For example, on RHEL 7, this can be done by commenting out or removing the
"LoadModule auth_digest_module modules/mod_auth_digest.so"
line within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.

You can then use the "httpd -t -D DUMP_MODULES" command to verify that the module is no longer loaded.