CVE-2016-8743
Summary
| CVE | CVE-2016-8743 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-07-27 21:29:00 UTC |
| Updated | 2023-11-07 02:36:00 UTC |
| Description | Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Http Server | 2.4.1 | All | All | All |
| Application | Apache | Http Server | 2.4.10 | All | All | All |
| Application | Apache | Http Server | 2.4.12 | All | All | All |
| Application | Apache | Http Server | 2.4.16 | All | All | All |
| Application | Apache | Http Server | 2.4.17 | All | All | All |
| Application | Apache | Http Server | 2.4.18 | All | All | All |
| Application | Apache | Http Server | 2.4.2 | All | All | All |
| Application | Apache | Http Server | 2.4.20 | All | All | All |
| Application | Apache | Http Server | 2.4.23 | All | All | All |
| Application | Apache | Http Server | 2.4.3 | All | All | All |
| Application | Apache | Http Server | 2.4.4 | All | All | All |
| Application | Apache | Http Server | 2.4.6 | All | All | All |
| Application | Apache | Http Server | 2.4.7 | All | All | All |
| Application | Apache | Http Server | 2.4.9 | All | All | All |
| Application | Apache | Http Server | 2.4.1 | All | All | All |
| Application | Apache | Http Server | 2.4.10 | All | All | All |
| Application | Apache | Http Server | 2.4.12 | All | All | All |
| Application | Apache | Http Server | 2.4.16 | All | All | All |
| Application | Apache | Http Server | 2.4.17 | All | All | All |
| Application | Apache | Http Server | 2.4.18 | All | All | All |
| Application | Apache | Http Server | 2.4.2 | All | All | All |
| Application | Apache | Http Server | 2.4.20 | All | All | All |
| Application | Apache | Http Server | 2.4.23 | All | All | All |
| Application | Apache | Http Server | 2.4.3 | All | All | All |
| Application | Apache | Http Server | 2.4.4 | All | All | All |
| Application | Apache | Http Server | 2.4.6 | All | All | All |
| Application | Apache | Http Server | 2.4.7 | All | All | All |
| Application | Apache | Http Server | 2.4.9 | All | All | All |
| Application | Apache | Http Server | All | All | All | All |
| Application | Apache | Http Server | All | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Application | Netapp | Clustered Data Ontap | - | All | All | All |
| Application | Netapp | Oncommand Unified Manager | - | All | All | All |
| Operating System | Redhat | Enterprise Linux | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 7.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 7.6 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 7.7 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.6 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.7 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Tus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Tus | 7.6 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Tus | 7.7 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 7.0 | All | All | All |
| Application | Redhat | Jboss Core Services | 1.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | lists.apache.org | ||
| Red Hat Customer Portal | REDHAT | access.redhat.com | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Red Hat Customer Portal | REDHAT | access.redhat.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | lists.apache.org | ||
| About the security content of macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan - Apple Support | CONFIRM | support.apple.com | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | lists.apache.org | ||
| Red Hat Customer Portal | REDHAT | access.redhat.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| December 2016 Apache HTTP Server Vulnerabilities in Multiple NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | |
| Pony Mail! | lists.apache.org | ||
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | |
| Pony Mail! | lists.apache.org | ||
| Debian -- Security Information -- DSA-3796-1 apache2 | DEBIAN | www.debian.org | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| [R5] SecurityCenter 5.4.3 Fixes Multiple Vulnerabilities - Security Advisory | Tenable Network Security | CONFIRM | www.tenable.com | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Red Hat Customer Portal | REDHAT | access.redhat.com | |
| Apache HTTPD Multiple Flaws Let Remote Users Deny Service, Conduct HTTP Response Splitting Attacks, and Access and Modify Session Data - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | Third Party Advisory |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | lists.apache.org | ||
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | |
| Red Hat Customer Portal | REDHAT | access.redhat.com | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Apache HTTP Server CVE-2016-8743 Security Bypass Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| httpd 2.4 vulnerabilities - The Apache HTTP Server Project | CONFIRM | httpd.apache.org | Vendor Advisory |
| Pony Mail! | MLIST | lists.apache.org | |
| Apache: Multiple vulnerabilities (GLSA 201701-36) — Gentoo security | GENTOO | security.gentoo.org | Patch, Third Party Advisory, VDB Entry |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | lists.apache.org | ||
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.