The Apache httpd project reports:
- ap_get_basic_auth_pw() Authentication Bypass (CVE-2017-3167):
Use of the ap_get_basic_auth_pw() by third-party modules outside
of the authentication phase may lead to authentication requirements
being bypassed.
- mod_ssl Null Pointer Dereference (CVE-2017-3169):
mod_ssl may
dereference a NULL pointer when third-party modules
call ap_hook_process_connection() during an HTTP request to an HTTPS
port.
- mod_http2 Null Pointer Dereference (CVE-2017-7659):
A maliciously
constructed HTTP/2 request could cause mod_http2 to dereference a NULL
pointer and crash the server process.
- ap_find_token() Buffer Overread (CVE-2017-7668):
The HTTP strict
parsing changes added in 2.2.32 and 2.4.24 introduced a bug in token
list parsing, which allows ap_find_token() to search past the end of its
input string. By maliciously crafting a sequence of request headers, an
attacker may be able to cause a segmentation fault, or to force
ap_find_token() to return an incorrect value.
- mod_mime Buffer Overread (CVE-2017-7679):
mod_mime can read one
byte past the end of a buffer when sending a malicious Content-Type
response header.