CVE Vulnerabilities

CVE-2016-2161

Use of Out-of-range Pointer Offset

Published: Jul 27, 2017 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
7.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW

In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.

Weakness

The product performs pointer arithmetic on a valid pointer, but it uses an offset that can point outside of the intended range of valid memory locations for the resulting pointer.

Affected Software

Name Vendor Start Version End Version
Http_server Apache 2.4.0 (including) 2.4.0 (including)
Http_server Apache 2.4.1 (including) 2.4.1 (including)
Http_server Apache 2.4.2 (including) 2.4.2 (including)
Http_server Apache 2.4.3 (including) 2.4.3 (including)
Http_server Apache 2.4.6 (including) 2.4.6 (including)
Http_server Apache 2.4.7 (including) 2.4.7 (including)
Http_server Apache 2.4.8 (including) 2.4.8 (including)
Http_server Apache 2.4.9 (including) 2.4.9 (including)
Http_server Apache 2.4.10 (including) 2.4.10 (including)
Http_server Apache 2.4.12 (including) 2.4.12 (including)
Http_server Apache 2.4.14 (including) 2.4.14 (including)
Http_server Apache 2.4.16 (including) 2.4.16 (including)
Http_server Apache 2.4.19 (including) 2.4.19 (including)
Http_server Apache 2.4.20 (including) 2.4.20 (including)
Http_server Apache 2.4.21 (including) 2.4.21 (including)
Http_server Apache 2.4.22 (including) 2.4.22 (including)
Http_server Apache 2.4.23 (including) 2.4.23 (including)
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7 *
Red Hat Enterprise Linux 7 RedHat httpd-0:2.4.6-45.el7_3.4 *
Red Hat Software Collections for Red Hat Enterprise Linux 6 RedHat httpd24-httpd-0:2.4.25-9.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS RedHat httpd24-httpd-0:2.4.25-9.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat httpd24-httpd-0:2.4.25-9.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS RedHat httpd24-httpd-0:2.4.25-9.el7 *
Text-Only JBCS RedHat *
Apache2 Ubuntu trusty *
Apache2 Ubuntu upstream *
Apache2 Ubuntu xenial *
Apache2 Ubuntu yakkety *

Extended Description

While a pointer can contain a reference to any arbitrary memory location, a program typically only intends to use the pointer to access limited portions of memory, such as contiguous memory used to access an individual array. Programs may use offsets in order to access fields or sub-elements stored within structured data. The offset might be out-of-range if it comes from an untrusted source, is the result of an incorrect calculation, or occurs because of another error. If an attacker can control or influence the offset so that it points outside of the intended boundaries of the structure, then the attacker may be able to read or write to memory locations that are used elsewhere in the product. As a result, the attack might change the state of the product as accessed through program variables, cause a crash or instable behavior, and possibly lead to code execution.

References