7.5

CVE-2017-9798

Exploit

Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.

Data is provided by the National Vulnerability Database (NVD)
ApacheHTTP Server Version <= 2.2.34
ApacheHTTP Server Version2.4.0
ApacheHTTP Server Version2.4.1
ApacheHTTP Server Version2.4.2
ApacheHTTP Server Version2.4.3
ApacheHTTP Server Version2.4.4
ApacheHTTP Server Version2.4.6
ApacheHTTP Server Version2.4.7
ApacheHTTP Server Version2.4.9
ApacheHTTP Server Version2.4.10
ApacheHTTP Server Version2.4.12
ApacheHTTP Server Version2.4.16
ApacheHTTP Server Version2.4.17
ApacheHTTP Server Version2.4.18
ApacheHTTP Server Version2.4.20
ApacheHTTP Server Version2.4.23
ApacheHTTP Server Version2.4.25
ApacheHTTP Server Version2.4.26
ApacheHTTP Server Version2.4.27
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 93.98% 0.999
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.

http://www.securityfocus.com/bid/100872
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/105598
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039387
Third Party Advisory
VDB Entry
https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch
Patch
Third Party Advisory
Exploit
Technical Description
https://github.com/hannob/optionsbleed
Third Party Advisory
Exploit
https://www.exploit-db.com/exploits/42745/
Third Party Advisory
Exploit
VDB Entry