Improper input validation in Apache HTTP Server - CVE-2016-8612

 

Improper input validation in Apache HTTP Server - CVE-2016-8612

Published: March 12, 2018 / Updated: March 13, 2018


Vulnerability identifier: #VU10953
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-8612
CWE-ID: CWE-20
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: Apache Foundation
Affected software:
Apache HTTP Server

Detailed vulnerability description

The vulnerability allows an adjacent unauthenticated attacker to cause DoS condition on the target system.

The weakness exists in the mod_cluster module due to improper input validation by the protocol parsing logic in the mod_cluster module. An adjacent attacker can send a specially crafted request, trigger a segmentation fault in the serving httpdprocess and cause the service to crash.


How to mitigate CVE-2016-8612

Update to version 2.4.23.

Sources