SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Apache HTTPD Vendors:   Apache Software Foundation
(CentOS Issues Fix) Apache HTTPD Use-After-Free Memory Error in Processing HTTP OPTIONS Requests Lets Remote Users Obtain Potentially Sensitive Information on the Target System in Certain Cases
SecurityTracker Alert ID:  1039565
SecurityTracker URL:  http://securitytracker.com/id/1039565
CVE Reference:   CVE-2017-9798   (Links to External Site)
Date:  Oct 12 2017
Impact:   Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 2.4.28
Description:   A vulnerability was reported in Apache HTTPD. A remote user can obtain potentially sensitive information on the target system in certain cases.

On systems with the Limit directive set within a '.htaccess' file and set to an invalid HTTP method, a remote user can send a specially crafted HTTP OPTIONS request for a path to trigger a use-after-free memory error and view potentially sensitive information from process memory on the target system.

This vulnerability is referred to as "Optionsbleed".

The original advisory is available at:

https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html

Hanno Bock reported this vulnerability.

Impact:   A remote user can obtain potentially sensitive information on the target system in certain cases.
Solution:   CentOS has issued a fix.

x86_64:
41421bbfa809cd1fea427ffd689e2caa4d92643aec1094ce7c2271702f19480a httpd-2.4.6-67.el7.centos.5.x86_64.rpm
2814b75b35bf8fed0fd12033d1fc0b6203a60926646fb3151cbda49260175522 httpd-devel-2.4.6-67.el7.centos.5.x86_64.rpm
2156dda1f88729bbf47dcd000911942d122a0797d55fcfdcb65e1ead2e3601e8 httpd-manual-2.4.6-67.el7.centos.5.noarch.rpm
d1152bdf63709d455dbba51fd7aafc4b69cb45dd48073edfe4b337157a3974b4 httpd-tools-2.4.6-67.el7.centos.5.x86_64.rpm
0e4029a1ac0b75e2363c7803282e5230cdf4260122ffbf2daeaec955a94f71ac mod_ldap-2.4.6-67.el7.centos.5.x86_64.rpm
fe94afba530fb88bfbe1bd782afe61dd69212c30920d14574099468a2ce76844 mod_proxy_html-2.4.6-67.el7.centos.5.x86_64.rpm
cae78de9a2bb32f12af2bf7895cc27c2f95119787b7139b5ab0ea018b6738113 mod_session-2.4.6-67.el7.centos.5.x86_64.rpm
829d9f95fafbdc31c0e14180b688f27beb329c00961c5340e9609b9789070ea6 mod_ssl-2.4.6-67.el7.centos.5.x86_64.rpm

Source:
5cc7d1292f22dc068f166c8e722456158f9856c29a71887581394a99a4615ab0 httpd-2.4.6-67.el7.centos.5.src.rpm

Cause:   Access control error, State error
Underlying OS:  Linux (CentOS)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Sep 19 2017 Apache HTTPD Use-After-Free Memory Error in Processing HTTP OPTIONS Requests Lets Remote Users Obtain Potentially Sensitive Information on the Target System in Certain Cases



 Source Message Contents

Subject:  [CentOS-announce] CESA-2017:2882 Moderate CentOS 7 httpd Security Update


CentOS Errata and Security Advisory 2017:2882 Moderate

Upstream details at : https://access.redhat.com/errata/RHSA-2017:2882

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
41421bbfa809cd1fea427ffd689e2caa4d92643aec1094ce7c2271702f19480a  httpd-2.4.6-67.el7.centos.5.x86_64.rpm
2814b75b35bf8fed0fd12033d1fc0b6203a60926646fb3151cbda49260175522  httpd-devel-2.4.6-67.el7.centos.5.x86_64.rpm
2156dda1f88729bbf47dcd000911942d122a0797d55fcfdcb65e1ead2e3601e8  httpd-manual-2.4.6-67.el7.centos.5.noarch.rpm
d1152bdf63709d455dbba51fd7aafc4b69cb45dd48073edfe4b337157a3974b4  httpd-tools-2.4.6-67.el7.centos.5.x86_64.rpm
0e4029a1ac0b75e2363c7803282e5230cdf4260122ffbf2daeaec955a94f71ac  mod_ldap-2.4.6-67.el7.centos.5.x86_64.rpm
fe94afba530fb88bfbe1bd782afe61dd69212c30920d14574099468a2ce76844  mod_proxy_html-2.4.6-67.el7.centos.5.x86_64.rpm
cae78de9a2bb32f12af2bf7895cc27c2f95119787b7139b5ab0ea018b6738113  mod_session-2.4.6-67.el7.centos.5.x86_64.rpm
829d9f95fafbdc31c0e14180b688f27beb329c00961c5340e9609b9789070ea6  mod_ssl-2.4.6-67.el7.centos.5.x86_64.rpm

Source:
5cc7d1292f22dc068f166c8e722456158f9856c29a71887581394a99a4615ab0  httpd-2.4.6-67.el7.centos.5.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC