Apache HTTP Server security may be impacted by missing bounds checks in the 
SDBM implementation from APR prior to version 1.6.3 (released October 22, 2017) 
[1]. SDBM can be used in various parts of Apache HTTP Server including most 
notably for authentication and object caching.  While it is unlikely that a 
remote attacker could ever present the server with crafted SDBM pages, the 
possibility exists that an attacker may be able to leverage this behavior in a 
shared hosting environment to extract secrets from other sites.

These issues were identified using the AFL fuzzer with ASAN and have been 
assigned CVE-2017-12618 (APR).  As previously noted, the custom pool allocator 
used in APR can mask memory safety issues from ASAN so it is possible that the 
risk may extend beyond application crashes and information disclosure [2].

[1] http://www.apache.org/dist/apr/Announcement1.x.html
[2] https://fuzzing-project.org/tutorial-tips.html

Best Regards,
Craig Young
Principal Security Researcher, Tripwire VERT

Reply via email to