Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2016-0736
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- Partial
- Availability Impact
- None
- Integrity Impact
- None
CVSSv3.1 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 3.9/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- None
- Impact Score
- 3.6/10
- Confidentiality Impact
- High
- Availability Impact
- None
- Integrity Impact
- None
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.22:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.21:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-0736
- https://security.gentoo.org/glsa/201701-36
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux
- http://www.securitytracker.com/id/1037508
- http://www.securityfocus.com/bid/95078
- https://www.exploit-db.com/exploits/40961/
- https://www.tenable.com/security/tns-2017-04
- http://www.debian.org/security/2017/dsa-3796
- https://support.apple.com/HT208221
- https://access.redhat.com/errata/RHSA-2017:1414
- https://access.redhat.com/errata/RHSA-2017:1413
- https://access.redhat.com/errata/RHSA-2017:1161
- https://access.redhat.com/errata/RHSA-2017:0906
- http://rhn.redhat.com/errata/RHSA-2017-1415.html
- https://security.netapp.com/advisory/ntap-20180423-0001/
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e1004502092
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4
- https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997be
- https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708
- https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad8954107
- https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfc