[arch-security] [ASA-201709-15] apache: information disclosure

Levente Polyak anthraxx at archlinux.org
Mon Sep 18 17:56:58 UTC 2017


Arch Linux Security Advisory ASA-201709-15
==========================================

Severity: High
Date    : 2017-09-18
CVE-ID  : CVE-2017-9798
Package : apache
Type    : information disclosure
Remote  : Yes
Link    : https://security.archlinux.org/AVG-404

Summary
=======

The package apache before version 2.4.27-2 is vulnerable to information
disclosure.

Resolution
==========

Upgrade to 2.4.27-2.

# pacman -Syu "apache>=2.4.27-2"

The problem has been fixed upstream but no release is available yet.

Workaround
==========

None.

Description
===========

An use after free vulnerability has been discovered in Apache HTTP
2.4.27 that causes a corrupted Allow header to be constructed in
response to HTTP OPTIONS requests. This can leak pieces of arbitrary
memory from the server process that may contain secrets. The memory
pieces change after multiple requests, so for a vulnerable host an
arbitrary number of memory chunks can be leaked.
The bug appears if a webmaster tries to use the "Limit" directive with
an invalid HTTP method.

Impact
======

A remote attacker is able to leak memory and potentially obtain
sensitive information from the server process.

References
==========

https://bz.apache.org/bugzilla/show_bug.cgi?id=61207
https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch
http://www.openwall.com/lists/oss-security/2017/09/18/2
https://github.com/hannob/optionsbleed
https://security.archlinux.org/CVE-2017-9798

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 866 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170918/ec495b6d/attachment.asc>


More information about the arch-security mailing list