CVEs referencing
https://support.apple.com/HT208221

In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
Max Base Score
7.5
Published
2017-07-27
Updated
2021-06-06
EPSS
1.32%
In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
Max Base Score
7.5
Published
2017-07-27
Updated
2021-06-06
EPSS
2.96%
libarchive in Apple OS X before 10.12 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted file.
Max Base Score
9.3
Published
2016-09-25
Updated
2017-11-14
EPSS
1.07%
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
Max Base Score
8.1
Published
2016-07-19
Updated
2022-09-07
EPSS
20.61%
The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.
Max Base Score
7.5
Published
2016-12-05
Updated
2021-06-06
EPSS
2.68%
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
Max Base Score
7.5
Published
2017-07-27
Updated
2022-09-07
EPSS
0.27%
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
Max Base Score
9.8
Published
2017-06-20
Updated
2021-06-06
EPSS
1.58%
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
Max Base Score
9.8
Published
2017-06-20
Updated
2021-06-06
EPSS
1.65%
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Quick Look" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted Office document.
Max Base Score
7.8
Published
2017-11-13
Updated
2017-11-27
EPSS
0.48%
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Security" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.
Max Base Score
9.3
Published
2018-04-03
Updated
2018-04-27
EPSS
0.07%
A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.
Max Base Score
7.5
Published
2017-07-26
Updated
2021-06-06
EPSS
77.80%
The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
Max Base Score
7.5
Published
2017-06-20
Updated
2022-04-21
EPSS
35.24%
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
Max Base Score
9.8
Published
2017-06-20
Updated
2021-06-06
EPSS
0.64%
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
Max Base Score
9.1
Published
2017-07-13
Updated
2021-06-06
EPSS
53.95%
When under stress, closing many connections, the HTTP/2 handling code in Apache httpd 2.4.26 would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.
Max Base Score
7.5
Published
2017-07-13
Updated
2021-06-06
EPSS
5.23%
Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.
Max Base Score
8.1
Published
2017-07-13
Updated
2020-08-18
EPSS
4.70%
tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.
Max Base Score
7.5
Published
2017-07-08
Updated
2019-10-03
EPSS
0.65%
tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c.
Max Base Score
9.8
Published
2017-07-23
Updated
2019-10-03
EPSS
4.84%
tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c.
Max Base Score
9.8
Published
2017-07-23
Updated
2019-10-03
EPSS
4.84%
tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c.
Max Base Score
9.8
Published
2017-07-23
Updated
2018-05-17
EPSS
16.05%
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!