[prev in list] [next in list] [prev in thread] [next in thread]
List: apache-httpd-users
Subject: [users@httpd] Memory Safety Issues Handling SDBM
From: Craig Young <cyoung () tripwire ! com>
Date: 2017-10-23 21:56:08
Message-ID: F8A12153-0C2D-43EA-8B42-528B5C89DCC7 () tripwire ! com
[Download RAW message or body]
[Attachment #2 (text/plain)]
Apache HTTP Server security may be impacted by missing bounds checks in the SDBM \
implementation from APR prior to version 1.6.3 (released October 22, 2017) [1]. SDBM \
can be used in various parts of Apache HTTP Server including most notably for \
authentication and object caching. While it is unlikely that a remote attacker could \
ever present the server with crafted SDBM pages, the possibility exists that an \
attacker may be able to leverage this behavior in a shared hosting environment to \
extract secrets from other sites.
These issues were identified using the AFL fuzzer with ASAN and have been assigned \
CVE-2017-12618 (APR). As previously noted, the custom pool allocator used in APR can \
mask memory safety issues from ASAN so it is possible that the risk may extend beyond \
application crashes and information disclosure [2].
[1] http://www.apache.org/dist/apr/Announcement1.x.html
[2] https://fuzzing-project.org/tutorial-tips.html
Best Regards,
Craig Young
Principal Security Researcher, Tripwire VERT
[Attachment #3 (text/html)]
<html xmlns:o="urn:schemas-microsoft-com:office:office" \
xmlns:w="urn:schemas-microsoft-com:office:word" \
xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" \
xmlns="http://www.w3.org/TR/REC-html40"> <head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Title" content="">
<meta name="Keywords" content="">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.msoIns
{mso-style-type:export-only;
mso-style-name:"";
text-decoration:underline;
color:teal;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style>
</head>
<body bgcolor="white" lang="EN-US" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p class="MsoNormal">Apache HTTP Server security may be impacted by missing bounds \
checks in the SDBM implementation from APR prior to version 1.6.3 (released October \
22, 2017) [1]. SDBM can be used in various parts of Apache HTTP Server including most \
notably for authentication and object caching. While it is unlikely that a \
remote attacker could ever present the server with crafted SDBM pages, the \
possibility exists that an attacker may be able to leverage this behavior in a shared \
hosting environment to extract secrets from other sites.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">These issues were identified using the AFL fuzzer with ASAN and \
have been assigned CVE-2017-12618 (APR). As previously noted, the custom pool \
allocator used in APR can mask memory safety issues from ASAN so it is possible that \
the risk may extend beyond application crashes and information disclosure \
[2].<o:p></o:p></p> <p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">[1] \
http://www.apache.org/dist/apr/Announcement1.x.html<o:p></o:p></p> <p \
class="MsoNormal">[2] https://fuzzing-project.org/tutorial-tips.html <o:p></o:p></p> \
<p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal">Best \
Regards,<o:p></o:p></p> <p class="MsoNormal">Craig Young<o:p></o:p></p>
<p class="MsoNormal">Principal Security Researcher, Tripwire VERT<o:p></o:p></p>
</div>
</body>
</html>
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic