Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2017-15710 CVE-2018-1301 CVE-2018-1302 CVE-2018-1303 CVE-2017-15715 CVE-2018-1283 CVE-2018-1312 |
CWE-ID | CWE-787 CWE-125 CWE-476 CWE-264 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Amazon Linux AMI Operating systems & Components / Operating system |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU11283
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2017-15710
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in HTTPD mod_authnz_ldap due to improper validation of user-supplied input. A remote attacker can send a specially crafted Accept-Language header value, trigger an out-of-bounds memory write error and potentially cause
the target service to crash.
Update the affected packages.
i686:Vulnerable software versions
httpd24-debuginfo-2.4.33-2.78.amzn1.i686
httpd24-2.4.33-2.78.amzn1.i686
mod24_session-2.4.33-2.78.amzn1.i686
mod24_md-2.4.33-2.78.amzn1.i686
mod24_ssl-2.4.33-2.78.amzn1.i686
httpd24-devel-2.4.33-2.78.amzn1.i686
httpd24-tools-2.4.33-2.78.amzn1.i686
mod24_proxy_html-2.4.33-2.78.amzn1.i686
mod24_ldap-2.4.33-2.78.amzn1.i686
noarch:
httpd24-manual-2.4.33-2.78.amzn1.noarch
src:
httpd24-2.4.33-2.78.amzn1.src
x86_64:
httpd24-devel-2.4.33-2.78.amzn1.x86_64
httpd24-2.4.33-2.78.amzn1.x86_64
mod24_ssl-2.4.33-2.78.amzn1.x86_64
httpd24-debuginfo-2.4.33-2.78.amzn1.x86_64
mod24_ldap-2.4.33-2.78.amzn1.x86_64
mod24_proxy_html-2.4.33-2.78.amzn1.x86_64
mod24_session-2.4.33-2.78.amzn1.x86_64
mod24_md-2.4.33-2.78.amzn1.x86_64
httpd24-tools-2.4.33-2.78.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2018-1004.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11281
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-1301
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to improper validation of user-supplied input. A remote attacker can send a specially crafted HTTP request to trigger an out-of-bounds
memory access error after a header size limit has been reached to cause
the target service to crash.
Update the affected packages.
i686:Vulnerable software versions
httpd24-debuginfo-2.4.33-2.78.amzn1.i686
httpd24-2.4.33-2.78.amzn1.i686
mod24_session-2.4.33-2.78.amzn1.i686
mod24_md-2.4.33-2.78.amzn1.i686
mod24_ssl-2.4.33-2.78.amzn1.i686
httpd24-devel-2.4.33-2.78.amzn1.i686
httpd24-tools-2.4.33-2.78.amzn1.i686
mod24_proxy_html-2.4.33-2.78.amzn1.i686
mod24_ldap-2.4.33-2.78.amzn1.i686
noarch:
httpd24-manual-2.4.33-2.78.amzn1.noarch
src:
httpd24-2.4.33-2.78.amzn1.src
x86_64:
httpd24-devel-2.4.33-2.78.amzn1.x86_64
httpd24-2.4.33-2.78.amzn1.x86_64
mod24_ssl-2.4.33-2.78.amzn1.x86_64
httpd24-debuginfo-2.4.33-2.78.amzn1.x86_64
mod24_ldap-2.4.33-2.78.amzn1.x86_64
mod24_proxy_html-2.4.33-2.78.amzn1.x86_64
mod24_session-2.4.33-2.78.amzn1.x86_64
mod24_md-2.4.33-2.78.amzn1.x86_64
httpd24-tools-2.4.33-2.78.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2018-1004.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11287
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-1302
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to improper destruction of an HTTP/2 stream after being handled. A remote attacker can send a specially crafted HTTP/2 stream, write a NULL pointer value to an already freed memory space and cause the service to crash.
Update the affected packages.
i686:Vulnerable software versions
httpd24-debuginfo-2.4.33-2.78.amzn1.i686
httpd24-2.4.33-2.78.amzn1.i686
mod24_session-2.4.33-2.78.amzn1.i686
mod24_md-2.4.33-2.78.amzn1.i686
mod24_ssl-2.4.33-2.78.amzn1.i686
httpd24-devel-2.4.33-2.78.amzn1.i686
httpd24-tools-2.4.33-2.78.amzn1.i686
mod24_proxy_html-2.4.33-2.78.amzn1.i686
mod24_ldap-2.4.33-2.78.amzn1.i686
noarch:
httpd24-manual-2.4.33-2.78.amzn1.noarch
src:
httpd24-2.4.33-2.78.amzn1.src
x86_64:
httpd24-devel-2.4.33-2.78.amzn1.x86_64
httpd24-2.4.33-2.78.amzn1.x86_64
mod24_ssl-2.4.33-2.78.amzn1.x86_64
httpd24-debuginfo-2.4.33-2.78.amzn1.x86_64
mod24_ldap-2.4.33-2.78.amzn1.x86_64
mod24_proxy_html-2.4.33-2.78.amzn1.x86_64
mod24_session-2.4.33-2.78.amzn1.x86_64
mod24_md-2.4.33-2.78.amzn1.x86_64
httpd24-tools-2.4.33-2.78.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2018-1004.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11280
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-1303
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in Apache HTTPD mod_cache_socache due to improper validation of user-supplied input. A remote attacker can send a specially crafted HTTP request header, trigger an out-of-bounds memory read error in mod_cache_socache and
cause the target service to crash.
Update the affected packages.
i686:Vulnerable software versions
httpd24-debuginfo-2.4.33-2.78.amzn1.i686
httpd24-2.4.33-2.78.amzn1.i686
mod24_session-2.4.33-2.78.amzn1.i686
mod24_md-2.4.33-2.78.amzn1.i686
mod24_ssl-2.4.33-2.78.amzn1.i686
httpd24-devel-2.4.33-2.78.amzn1.i686
httpd24-tools-2.4.33-2.78.amzn1.i686
mod24_proxy_html-2.4.33-2.78.amzn1.i686
mod24_ldap-2.4.33-2.78.amzn1.i686
noarch:
httpd24-manual-2.4.33-2.78.amzn1.noarch
src:
httpd24-2.4.33-2.78.amzn1.src
x86_64:
httpd24-devel-2.4.33-2.78.amzn1.x86_64
httpd24-2.4.33-2.78.amzn1.x86_64
mod24_ssl-2.4.33-2.78.amzn1.x86_64
httpd24-debuginfo-2.4.33-2.78.amzn1.x86_64
mod24_ldap-2.4.33-2.78.amzn1.x86_64
mod24_proxy_html-2.4.33-2.78.amzn1.x86_64
mod24_session-2.4.33-2.78.amzn1.x86_64
mod24_md-2.4.33-2.78.amzn1.x86_64
httpd24-tools-2.4.33-2.78.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2018-1004.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11284
Risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-15715
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists on systems that allow uploading of user-specified filenames due to the '<FilesMatch>' expression may not correctly match characters in a filename. A remote attacker can supply a specially crafted filename to potentially bypass security
controls that use the '<FilesMatch>' directive.
Update the affected packages.
i686:Vulnerable software versions
httpd24-debuginfo-2.4.33-2.78.amzn1.i686
httpd24-2.4.33-2.78.amzn1.i686
mod24_session-2.4.33-2.78.amzn1.i686
mod24_md-2.4.33-2.78.amzn1.i686
mod24_ssl-2.4.33-2.78.amzn1.i686
httpd24-devel-2.4.33-2.78.amzn1.i686
httpd24-tools-2.4.33-2.78.amzn1.i686
mod24_proxy_html-2.4.33-2.78.amzn1.i686
mod24_ldap-2.4.33-2.78.amzn1.i686
noarch:
httpd24-manual-2.4.33-2.78.amzn1.noarch
src:
httpd24-2.4.33-2.78.amzn1.src
x86_64:
httpd24-devel-2.4.33-2.78.amzn1.x86_64
httpd24-2.4.33-2.78.amzn1.x86_64
mod24_ssl-2.4.33-2.78.amzn1.x86_64
httpd24-debuginfo-2.4.33-2.78.amzn1.x86_64
mod24_ldap-2.4.33-2.78.amzn1.x86_64
mod24_proxy_html-2.4.33-2.78.amzn1.x86_64
mod24_session-2.4.33-2.78.amzn1.x86_64
mod24_md-2.4.33-2.78.amzn1.x86_64
httpd24-tools-2.4.33-2.78.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2018-1004.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11282
Risk: Low
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-1283
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to modify data on the target system.
The weakness exists on systems with mod_session configured with SessionEnv on to forward session data to CGI applications due to improper input validation. A remote attacker can send a specially
crafted 'Session' header value to potentially modify mod_session data.
Update the affected packages.
i686:Vulnerable software versions
httpd24-debuginfo-2.4.33-2.78.amzn1.i686
httpd24-2.4.33-2.78.amzn1.i686
mod24_session-2.4.33-2.78.amzn1.i686
mod24_md-2.4.33-2.78.amzn1.i686
mod24_ssl-2.4.33-2.78.amzn1.i686
httpd24-devel-2.4.33-2.78.amzn1.i686
httpd24-tools-2.4.33-2.78.amzn1.i686
mod24_proxy_html-2.4.33-2.78.amzn1.i686
mod24_ldap-2.4.33-2.78.amzn1.i686
noarch:
httpd24-manual-2.4.33-2.78.amzn1.noarch
src:
httpd24-2.4.33-2.78.amzn1.src
x86_64:
httpd24-devel-2.4.33-2.78.amzn1.x86_64
httpd24-2.4.33-2.78.amzn1.x86_64
mod24_ssl-2.4.33-2.78.amzn1.x86_64
httpd24-debuginfo-2.4.33-2.78.amzn1.x86_64
mod24_ldap-2.4.33-2.78.amzn1.x86_64
mod24_proxy_html-2.4.33-2.78.amzn1.x86_64
mod24_session-2.4.33-2.78.amzn1.x86_64
mod24_md-2.4.33-2.78.amzn1.x86_64
httpd24-tools-2.4.33-2.78.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2018-1004.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11279
Risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-1312
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists in Apache HTTPD mod_auth_digest due to improper generation of HTTP Digest authentication nonce. A remote attacker can replay HTTP requests across the cluster without detection by the target server(s) and bypass replay protection.
Update the affected packages.
i686:Vulnerable software versions
httpd24-debuginfo-2.4.33-2.78.amzn1.i686
httpd24-2.4.33-2.78.amzn1.i686
mod24_session-2.4.33-2.78.amzn1.i686
mod24_md-2.4.33-2.78.amzn1.i686
mod24_ssl-2.4.33-2.78.amzn1.i686
httpd24-devel-2.4.33-2.78.amzn1.i686
httpd24-tools-2.4.33-2.78.amzn1.i686
mod24_proxy_html-2.4.33-2.78.amzn1.i686
mod24_ldap-2.4.33-2.78.amzn1.i686
noarch:
httpd24-manual-2.4.33-2.78.amzn1.noarch
src:
httpd24-2.4.33-2.78.amzn1.src
x86_64:
httpd24-devel-2.4.33-2.78.amzn1.x86_64
httpd24-2.4.33-2.78.amzn1.x86_64
mod24_ssl-2.4.33-2.78.amzn1.x86_64
httpd24-debuginfo-2.4.33-2.78.amzn1.x86_64
mod24_ldap-2.4.33-2.78.amzn1.x86_64
mod24_proxy_html-2.4.33-2.78.amzn1.x86_64
mod24_session-2.4.33-2.78.amzn1.x86_64
mod24_md-2.4.33-2.78.amzn1.x86_64
httpd24-tools-2.4.33-2.78.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2018-1004.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.