(Oracle Issues Fix for Oracle PeopleSoft Products) Apache HTTPD Use-After-Free Memory Error in Processing HTTP OPTIONS Requests Lets Remote Users Obtain Potentially Sensitive Information on the Target System in Certain Cases
|
SecurityTracker Alert ID: 1041892 |
SecurityTracker URL: http://securitytracker.com/id/1041892
|
CVE Reference:
CVE-2017-9798
(Links to External Site)
|
Date: Oct 16 2018
|
Impact:
Disclosure of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in Apache HTTPD. A remote user can obtain potentially sensitive information on the target system in certain cases. Oracle PeopleSoft Products is affected.
On systems with the Limit directive set within a '.htaccess' file and set to an invalid HTTP method, a remote user can send a specially crafted HTTP OPTIONS request for a path to trigger a use-after-free memory error and view potentially sensitive information from process memory on the target system.
This vulnerability is referred to as "Optionsbleed".
The original advisory is available at:
https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html
Hanno Bock reported this vulnerability.
|
Impact:
A remote user can obtain potentially sensitive information on the target system in certain cases.
|
Solution:
Oracle has issued a fix for CVE-2017-9798 for Oracle PeopleSoft Products.
The Oracle advisory is available at:
|
Cause:
Access control error, State error
|
Underlying OS: Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), UNIX (Tru64), Windows (NT), Windows (2000), Windows (2003), Windows (XP)
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
Subject: Oracle PeopleSoft Products
|
A remote user can exploit a flaw in the PeopleSoft Enterprise PeopleTools PeopleSoft CDA (Apache HTTP Server) component to access data [CVE-2017-9798].
|
|