Memory Safety Issues Handling SDBM

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Apache HTTP Server security may be impacted by missing bounds checks in the SDBM implementation from APR prior to version 1.6.3 (released October 22, 2017) [1]. SDBM can be used in various parts of Apache HTTP Server including most notably for authentication and object caching.  While it is unlikely that a remote attacker could ever present the server with crafted SDBM pages, the possibility exists that an attacker may be able to leverage this behavior in a shared hosting environment to extract secrets from other sites.

 

These issues were identified using the AFL fuzzer with ASAN and have been assigned CVE-2017-12618 (APR).  As previously noted, the custom pool allocator used in APR can mask memory safety issues from ASAN so it is possible that the risk may extend beyond application crashes and information disclosure [2].

 

[1] http://www.apache.org/dist/apr/Announcement1.x.html

[2] https://fuzzing-project.org/tutorial-tips.html

 

Best Regards,

Craig Young

Principal Security Researcher, Tripwire VERT


[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux