You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by bu...@apache.org on 2016/12/21 18:24:36 UTC

svn commit: r1003242 - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_24.html

Author: buildbot
Date: Wed Dec 21 18:24:36 2016
New Revision: 1003242

Log:
Staging update by buildbot for httpd

Modified:
    websites/staging/httpd/trunk/content/   (props changed)
    websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
    websites/staging/httpd/trunk/content/security/vulnerabilities_24.html

Propchange: websites/staging/httpd/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Wed Dec 21 18:24:36 2016
@@ -1 +1 @@
-1775362
+1775525

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml Wed Dec 21 18:24:36 2016
@@ -2,7 +2,7 @@
 
 <issue fixed="2.4.25" reported="20160210" public="20161220" released="20161220">
 <cve name="CVE-2016-8743"/>
-<severity level="0">TBD</severity>
+<severity level="2">important</severity>
 <title>Apache HTTP Request Parsing Whitespace Defects</title>
 <description><p>
 Apache HTTP Server, prior to release 2.4.25, accepted a broad pattern of 
@@ -100,7 +100,7 @@ as well as Régis Leroy for each repor
 
 <issue fixed="2.4.25" reported="20161122" public="20161204" released="20161220">
 <cve name="CVE-2016-8740"/>
-<severity level="0">n/a</severity>
+<severity level="4">low</severity>
 <title>HTTP/2 CONTINUATION denial of service</title>
 <description><p>
   The HTTP/2 protocol implementation (mod_http2) had an incomplete handling
@@ -136,6 +136,10 @@ and CDF/SEFCOM at Arizona State Universi
   <a href="https://www.apache.org/security/asf-httpoxy-response.txt"
      >https://www.apache.org/security/asf-httpoxy-response.txt</a>
   and incorporated in the 2.4.25 release.
+</p><p>  
+  Note: This is not assigned an httpd severity, as it is a defect in
+  other software which overloaded well-established CGI environment
+  variables, and does not reflect an error in HTTP server software.
 </p></description>
 <acknowledgements>
 We would like to thank Dominic Scheirlinck and Scott Geary of Vend 

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_24.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_24.html Wed Dec 21 18:24:36 2016
@@ -103,7 +103,7 @@ these vulnerabilities to the <a href="/s
 Team</a>.  </p><p><em>The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases.  Consult the <a href="vulnerabilities_22.html">Apache httpd 2.2 vulnerabilities list</a> for more information.</em></p><h1 id="2.4.25">
 Fixed in Apache httpd 2.4.25</h1><dl>
   <dd>
-    <b>TBD: </b>
+    <b>important: </b>
     <b>
       <name name="CVE-2016-8743">Apache HTTP Request Parsing Whitespace Defects</name>
     </b>
@@ -174,6 +174,34 @@ as well as Régis Leroy for each repor
   <dd>
     <b>low: </b>
     <b>
+      <name name="CVE-2016-8740">HTTP/2 CONTINUATION denial of service</name>
+    </b>
+    <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8740">CVE-2016-8740</a>
+    <p>
+  The HTTP/2 protocol implementation (mod_http2) had an incomplete handling
+  of the 
+  <a href="https://httpd.apache.org/docs/2.4/mod/core.html#limitrequestfields">LimitRequestFields</a>
+  directive. This allowed an attacker to inject unlimited request headers into
+  the server, leading to eventual memory exhaustion.
+</p>
+  </dd>
+  <dd>
+    <p>Acknowledgements: 
+We would like to thank Naveen Tiwari 
+and CDF/SEFCOM at Arizona State University to reporting this issue.
+</p>
+  </dd>
+  <dd>
+  Reported to security team: 22nd November 2016<br/>
+  Issue public: 4th December 2016<br/></dd>
+  <dd>
+  Update Released: 20th December 2016<br/></dd>
+  <dd>
+      Affects: 
+    2.4.23, 2.4.20, 2.4.18, 2.4.17<p/></dd>
+  <dd>
+    <b>low: </b>
+    <b>
       <name name="CVE-2016-2161">DoS vulnerability in mod_auth_digest</name>
     </b>
     <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161">CVE-2016-2161</a>
@@ -227,34 +255,6 @@ this issue.
   <dd>
     <b>n/a: </b>
     <b>
-      <name name="CVE-2016-8740">HTTP/2 CONTINUATION denial of service</name>
-    </b>
-    <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8740">CVE-2016-8740</a>
-    <p>
-  The HTTP/2 protocol implementation (mod_http2) had an incomplete handling
-  of the 
-  <a href="https://httpd.apache.org/docs/2.4/mod/core.html#limitrequestfields">LimitRequestFields</a>
-  directive. This allowed an attacker to inject unlimited request headers into
-  the server, leading to eventual memory exhaustion.
-</p>
-  </dd>
-  <dd>
-    <p>Acknowledgements: 
-We would like to thank Naveen Tiwari 
-and CDF/SEFCOM at Arizona State University to reporting this issue.
-</p>
-  </dd>
-  <dd>
-  Reported to security team: 22nd November 2016<br/>
-  Issue public: 4th December 2016<br/></dd>
-  <dd>
-  Update Released: 20th December 2016<br/></dd>
-  <dd>
-      Affects: 
-    2.4.23, 2.4.20, 2.4.18, 2.4.17<p/></dd>
-  <dd>
-    <b>n/a: </b>
-    <b>
       <name name="CVE-2016-5387">HTTP_PROXY environment variable "httpoxy" mitigation</name>
     </b>
     <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387">CVE-2016-5387</a>
@@ -270,6 +270,11 @@ and CDF/SEFCOM at Arizona State Universi
   <a href="https://www.apache.org/security/asf-httpoxy-response.txt">https://www.apache.org/security/asf-httpoxy-response.txt</a>
   and incorporated in the 2.4.25 release.
 </p>
+    <p>  
+  Note: This is not assigned an httpd severity, as it is a defect in
+  other software which overloaded well-established CGI environment
+  variables, and does not reflect an error in HTTP server software.
+</p>
   </dd>
   <dd>
     <p>Acknowledgements: