FreeBSD : Apache httpd -- multiple vulnerabilities (457ce015-67fa-11e7-867f-b499baebfeaf)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The Apache httpd project reports :

important: Read after free in mod_http2 (CVE-2017-9789) When under
stress, closing many connections, the HTTP/2 handling code would
sometimes access memory after it has been freed, resulting in
potentially erratic behaviour.

important: Uninitialized memory reflection in mod_auth_digest
(CVE-2017-9788)The value placeholder in [Proxy-]Authorization headers
of type 'Digest' was not initialized or reset before or between
successive key=value assignments. by mod_auth_digest. Providing an
initial key with no '=' assignment could reflect the stale value of
uninitialized pool memory used by the prior request, leading to
leakage of potentially confidential information, and a segfault.

See also :

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.4

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 101540 ()

Bugtraq ID:

CVE ID: CVE-2017-9788

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now