httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From build...@apache.org
Subject svn commit: r1003210 - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_24.html
Date Tue, 20 Dec 2016 23:42:46 GMT
Author: buildbot
Date: Tue Dec 20 23:42:46 2016
New Revision: 1003210

Log:
Staging update by buildbot for httpd

Modified:
    websites/staging/httpd/trunk/content/   (props changed)
    websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
    websites/staging/httpd/trunk/content/security/vulnerabilities_24.html

Propchange: websites/staging/httpd/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Tue Dec 20 23:42:46 2016
@@ -1 +1 @@
-1775358
+1775361

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml Tue Dec 20 23:42:46
2016
@@ -189,9 +189,12 @@ We would like to thank Maksim Malyutin f
 <severity level="4">low</severity>
 <title>Padding Oracle in Apache mod_session_crypto</title>
 <description><p>
-  Authenticate the session data/cookie presented to mod_session_crypto
-  with a MAC (SipHash) to prevent deciphering or tampering with a padding
-  oracle attack.
+  Prior to Apache HTTP release 2.4.25, mod_sessioncrypto was encrypting its
+  data/cookie using the configured ciphers with possibly either CBC or ECB
+  modes of operation (AES256-CBC by default), hence no selectable or builtin
+  authenticated encryption.
+  This made it vulnerable to padding oracle attacks, particularly with CBC.
+  An authententication tag (SipHash MAC) is now added to prevent such attacks.
 </p></description>
 <acknowledgements>
 We would like to thank Alexander Neumann of RedTeam Pentesting for reporting 

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_24.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_24.html Tue Dec 20 23:42:46
2016
@@ -202,9 +202,12 @@ We would like to thank Maksim Malyutin f
     </b>
     <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736">CVE-2016-0736</a>
     <p>
-  Authenticate the session data/cookie presented to mod_session_crypto
-  with a MAC (SipHash) to prevent deciphering or tampering with a padding
-  oracle attack.
+  Prior to Apache HTTP release 2.4.25, mod_sessioncrypto was encrypting its
+  data/cookie using the configured ciphers with possibly either CBC or ECB
+  modes of operation (AES256-CBC by default), hence no selectable or builtin
+  authenticated encryption.
+  This made it vulnerable to padding oracle attacks, particularly with CBC.
+  An authententication tag (SipHash MAC) is now added to prevent such attacks.
 </p>
   </dd>
   <dd>



Mime
View raw message