Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 919F7200CBB for ; Tue, 20 Jun 2017 00:09:25 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id 902B7160BE4; Mon, 19 Jun 2017 22:09:25 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id CE85D160BE1 for ; Tue, 20 Jun 2017 00:09:24 +0200 (CEST) Received: (qmail 27575 invoked by uid 500); 19 Jun 2017 22:09:22 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 27554 invoked by uid 99); 19 Jun 2017 22:09:22 -0000 Received: from mail-relay.apache.org (HELO mail-relay.apache.org) (140.211.11.15) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 19 Jun 2017 22:09:22 +0000 Received: from [192.168.1.2] (50-39-112-180.bvtn.or.frontiernet.net [50.39.112.180]) by mail-relay.apache.org (ASF Mail Server at mail-relay.apache.org) with ESMTPSA id 6C5781A0048; Mon, 19 Jun 2017 22:09:22 +0000 (UTC) From: Jacob Champion Reply-To: users@httpd.apache.org To: httpd-dev , users@httpd.apache.org Message-ID: Date: Mon, 19 Jun 2017 15:09:22 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.1.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Subject: [users@httpd] CVE-2017-7679: mod_mime buffer overread archived-at: Mon, 19 Jun 2017 22:09:25 -0000 CVE-2017-7679: mod_mime buffer overread Severity: Important Vendor: The Apache Software Foundation Versions Affected: httpd 2.2.0 to 2.2.32 httpd 2.4.0 to 2.4.25 Description: mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header. Mitigation: 2.2.x users should either apply the patch available at https://www.apache.org/dist/httpd/patches/apply_to_2.2.32/CVE-2017-7679.patch or upgrade in the future to 2.2.33, which is currently unreleased. 2.4.x users should upgrade to 2.4.26. Credit: The Apache HTTP Server security team would like to thank ChenQin and Hanno Böck for reporting this issue. References: https://httpd.apache.org/security_report.html --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org For additional commands, e-mail: users-help@httpd.apache.org