7.5
CVE-2017-9798
- EPSS 93.98%
- Veröffentlicht 18.09.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle security@apache.org
- Teams Watchlist Login
- Unerledigt Login
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Apache ≫ HTTP Server Version <= 2.2.34
Apache ≫ HTTP Server Version2.4.0
Apache ≫ HTTP Server Version2.4.1
Apache ≫ HTTP Server Version2.4.2
Apache ≫ HTTP Server Version2.4.3
Apache ≫ HTTP Server Version2.4.4
Apache ≫ HTTP Server Version2.4.6
Apache ≫ HTTP Server Version2.4.7
Apache ≫ HTTP Server Version2.4.9
Apache ≫ HTTP Server Version2.4.10
Apache ≫ HTTP Server Version2.4.12
Apache ≫ HTTP Server Version2.4.16
Apache ≫ HTTP Server Version2.4.17
Apache ≫ HTTP Server Version2.4.18
Apache ≫ HTTP Server Version2.4.20
Apache ≫ HTTP Server Version2.4.23
Apache ≫ HTTP Server Version2.4.25
Apache ≫ HTTP Server Version2.4.26
Apache ≫ HTTP Server Version2.4.27
Debian ≫ Debian Linux Version7.0
Debian ≫ Debian Linux Version8.0
Debian ≫ Debian Linux Version9.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 93.98% | 0.999 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-416 Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.