Think you have a false positive on this rule?

Sid 1-43547

Message

SERVER-APACHE httpd mod_mime content-type buffer overflow attempt

Summary

In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.

Impact

CVSS base score 9.8 CVSS impact score 5.9 CVSS exploitability score 3.9 confidentialityImpact HIGH integrityImpact HIGH availabilityImpact HIGH

CVE-2017-7679:

CVSS base score 9.8

CVSS impact score 5.9

CVSS exploitability score 3.9

Confidentiality Impact HIGH

Integrity Impact HIGH

Availability Impact HIGH

Detailed information

CVE-2017-7679: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.

Affected systems

  • apache http_server 2.2.0
  • apache http_server 2.2.2
  • apache http_server 2.2.3
  • apache http_server 2.2.11
  • apache http_server 2.2.12
  • apache http_server 2.2.13
  • apache http_server 2.2.14
  • apache http_server 2.2.15
  • apache http_server 2.2.16
  • apache http_server 2.2.17
  • apache http_server 2.2.18
  • apache http_server 2.2.19
  • apache http_server 2.2.20
  • apache http_server 2.2.21
  • apache http_server 2.2.22
  • apache http_server 2.2.23
  • apache http_server 2.2.24
  • apache http_server 2.2.25
  • apache http_server 2.2.26
  • apache http_server 2.2.27
  • apache http_server 2.2.29
  • apache http_server 2.2.30
  • apache http_server 2.2.31
  • apache http_server 2.2.32
  • apache http_server 2.4.1
  • apache http_server 2.4.2
  • apache http_server 2.4.10
  • apache http_server 2.4.12
  • apache http_server 2.4.16
  • apache http_server 2.4.17
  • apache http_server 2.4.18
  • apache http_server 2.4.20
  • apache http_server 2.4.23
  • apache http_server 2.4.25

Ease of attack

CVE-2017-7679:

Access Vector

Access Complexity

Authentication

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References