FreeBSD : Apache httpd -- multiple vulnerabilities (457ce015-67fa-11e7-867f-b499baebfeaf)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The Apache httpd project reports :

important: Read after free in mod_http2 (CVE-2017-9789) When under
stress, closing many connections, the HTTP/2 handling code would
sometimes access memory after it has been freed, resulting in
potentially erratic behaviour.

important: Uninitialized memory reflection in mod_auth_digest
(CVE-2017-9788)The value placeholder in [Proxy-]Authorization headers
of type 'Digest' was not initialized or reset before or between
successive key=value assignments. by mod_auth_digest. Providing an
initial key with no '=' assignment could reflect the stale value of
uninitialized pool memory used by the prior request, leading to
leakage of potentially confidential information, and a segfault.

See also :

https://httpd.apache.org/security/vulnerabilities_24.html
http://www.nessus.org/u?4bd65c30

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 101540 ()

Bugtraq ID:

CVE ID: CVE-2017-9788
CVE-2017-9789

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now