You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@httpd.apache.org by Craig Young <cy...@tripwire.com> on 2017/10/23 21:56:08 UTC

[users@httpd] Memory Safety Issues Handling SDBM

Apache HTTP Server security may be impacted by missing bounds checks in the SDBM implementation from APR prior to version 1.6.3 (released October 22, 2017) [1]. SDBM can be used in various parts of Apache HTTP Server including most notably for authentication and object caching.  While it is unlikely that a remote attacker could ever present the server with crafted SDBM pages, the possibility exists that an attacker may be able to leverage this behavior in a shared hosting environment to extract secrets from other sites.

These issues were identified using the AFL fuzzer with ASAN and have been assigned CVE-2017-12618 (APR).  As previously noted, the custom pool allocator used in APR can mask memory safety issues from ASAN so it is possible that the risk may extend beyond application crashes and information disclosure [2].

[1] http://www.apache.org/dist/apr/Announcement1.x.html
[2] https://fuzzing-project.org/tutorial-tips.html

Best Regards,
Craig Young
Principal Security Researcher, Tripwire VERT