The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: apache
Published: 2017-06-20T01:00:00
Updated: 2024-08-05T16:12:28.098Z
Reserved: 2017-04-11T00:00:00
Link: CVE-2017-7668
Vulnrichment
No data.
NVD
Status : Modified
Published: 2017-06-20T01:29:00.390
Modified: 2024-11-21T03:32:25.300
Link: CVE-2017-7668
Redhat