[prev in list] [next in list] [prev in thread] [next in thread] 

List:       apache-httpd-users
Subject:    [users@httpd] Memory Safety Issues Handling SDBM
From:       Craig Young <cyoung () tripwire ! com>
Date:       2017-10-23 21:56:08
Message-ID: F8A12153-0C2D-43EA-8B42-528B5C89DCC7 () tripwire ! com
[Download RAW message or body]

[Attachment #2 (text/plain)]

Apache HTTP Server security may be impacted by missing bounds checks in the SDBM \
implementation from APR prior to version 1.6.3 (released October 22, 2017) [1]. SDBM \
can be used in various parts of Apache HTTP Server including most notably for \
authentication and object caching.  While it is unlikely that a remote attacker could \
ever present the server with crafted SDBM pages, the possibility exists that an \
attacker may be able to leverage this behavior in a shared hosting environment to \
extract secrets from other sites.

These issues were identified using the AFL fuzzer with ASAN and have been assigned \
CVE-2017-12618 (APR).  As previously noted, the custom pool allocator used in APR can \
mask memory safety issues from ASAN so it is possible that the risk may extend beyond \
application crashes and information disclosure [2].

[1] http://www.apache.org/dist/apr/Announcement1.x.html
[2] https://fuzzing-project.org/tutorial-tips.html

Best Regards,
Craig Young
Principal Security Researcher, Tripwire VERT


[Attachment #3 (text/html)]

<html xmlns:o="urn:schemas-microsoft-com:office:office" \
xmlns:w="urn:schemas-microsoft-com:office:word" \
xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" \
xmlns="http://www.w3.org/TR/REC-html40"> <head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Title" content="">
<meta name="Keywords" content="">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.msoIns
	{mso-style-type:export-only;
	mso-style-name:"";
	text-decoration:underline;
	color:teal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style>
</head>
<body bgcolor="white" lang="EN-US" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p class="MsoNormal">Apache HTTP Server security may be impacted by missing bounds \
checks in the SDBM implementation from APR prior to version 1.6.3 (released October \
22, 2017) [1]. SDBM can be used in various parts of Apache HTTP Server including most \
notably  for authentication and object caching.&nbsp; While it is unlikely that a \
remote attacker could ever present the server with crafted SDBM pages, the \
possibility exists that an attacker may be able to leverage this behavior in a shared \
hosting environment to extract  secrets from other sites.<o:p></o:p></p>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
<p class="MsoNormal">These issues were identified using the AFL fuzzer with ASAN and \
have been assigned CVE-2017-12618 (APR).&nbsp; As previously noted, the custom pool \
allocator used in APR can mask memory safety issues from ASAN so it is possible that \
the risk  may extend beyond application crashes and information disclosure \
[2].<o:p></o:p></p> <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
<p class="MsoNormal">[1] \
http://www.apache.org/dist/apr/Announcement1.x.html<o:p></o:p></p> <p \
class="MsoNormal">[2] https://fuzzing-project.org/tutorial-tips.html <o:p></o:p></p> \
<p class="MsoNormal"><o:p>&nbsp;</o:p></p> <p class="MsoNormal">Best \
Regards,<o:p></o:p></p> <p class="MsoNormal">Craig Young<o:p></o:p></p>
<p class="MsoNormal">Principal Security Researcher, Tripwire VERT<o:p></o:p></p>
</div>
</body>
</html>



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic