SB2017092024 - Use-after-free in apache2 (Alpine package)
Published: September 20, 2017
Security Bulletin ID
SB2017092024
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Information disclosure
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2017-9798)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to use-after-free error when processing HTTP OPTIONS requests in server/core.c, when limits are configured in .htaccess or httpd.conf configuration files. A remote unauthenticated attacker can read portions of memory through HTTP OPTIONS requests and gain access to potentially sensitive data.
The vulnerability is dubbed Optionsbleed.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=33c9b879e1ac2712ea308a9c9e642d83b54d690d
- https://git.alpinelinux.org/aports/commit/?id=fc2557dadf48a27feaa29261edcaa62ea4fc367e
- https://git.alpinelinux.org/aports/commit/?id=fd6ba6486b93c77fbbbb95cffe4d8c6cd1946432
- https://git.alpinelinux.org/aports/commit/?id=07a401b4c538f65152f7f9ec9f5067cd866cde4e
- https://git.alpinelinux.org/aports/commit/?id=3e84f75e8679e0d11861df13004f450b79bd45ca
- https://git.alpinelinux.org/aports/commit/?id=6113fd53b8d6aa8846f017a77ea8482c9d44469b
- https://git.alpinelinux.org/aports/commit/?id=e4b2dba8f44125f43a613dacc0ba3737b1e4e1cc