CVE-2017-9788
critical-risk
Published 2017-07-13
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
Do I need to act?
!
52.6% chance of exploitation in next 30 days
EPSS score — higher than 47% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
References (92)
Third Party Advisory
http://www.debian.org/security/2017/dsa-3913
Third Party Advisory
http://www.securityfocus.com/bid/99569
Third Party Advisory
http://www.securitytracker.com/id/1038906
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2478
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2479
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2483
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2708
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2709
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2710
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3113
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3114
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3193
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3194
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3195
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3239
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3240
Vendor Advisory
https://httpd.apache.org/security/vulnerabilities_22.html
Vendor Advisory
https://httpd.apache.org/security/vulnerabilities_24.html
and 72 more references
72
/ 100
critical-risk
Severity
31/34 · Critical
Exploitability
18/34 · Moderate
Exposure
23/34 · High