[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Apache HTTP server - (bulletinjan2018)

ID: oval:org.secpod.oval:def:2101666Date: (C)2019-12-31   (M)2024-02-19
Class: PATCHFamily: unix




Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user"s .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.

Platform:
Sun Solaris 11
Product:
web/server/apache-24
web/server/apache-24/module/apache-ssl
web/server/apache-24/module/apache-ssl-fips-140
web/server/apache-24/module/apache-lua
web/server/apache-24/module/apache-ldap
web/server/apache-24/module/apache-dbd
web/server/apache-22
web/server/apache-22/module/apache-sed
web/server/apache-22/documentation
Reference:
bulletinjan2018
CVE-2017-9798
CVE    1
CVE-2017-9798
CPE    1
cpe:/o:oracle:solaris:11

© SecPod Technologies