HTTP: Apache Httpd Options Method Memory Leak

This signature detects attempts to exploit a known vulnerability against Apache Httpd. A successful attack can lead to arbitrary code execution.

Extended Description

Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.

Affected Products

Apache http_server

References

BugTraq: 100872

CVE: CVE-2017-9798

Short Name
HTTP:APACHE:HTTPD-OPTION-METHOD
Severity
Warning
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Apache CVE-2017-9798 Httpd Leak Memory Method Options bid:100872
Release Date
10/31/2018
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3809
False Positive
Rarely
Vendors

Apache

Debian

CVSS Score

5.0

Found a potential security threat?