First published: Mon Sep 11 2017(Updated: )
apache. Multiple issues were addressed by updating to version 2.4.28.
Credit: Hanno Böck security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.23-125.jbcs.el6 | 0:2.4.23-125.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.23-125.jbcs.el7 | 0:2.4.23-125.jbcs.el7 |
redhat/httpd | <0:2.2.15-60.el6_9.6 | 0:2.2.15-60.el6_9.6 |
redhat/httpd | <0:2.2.15-47.el6_7.5 | 0:2.2.15-47.el6_7.5 |
redhat/httpd | <0:2.4.6-67.el7_4.5 | 0:2.4.6-67.el7_4.5 |
redhat/httpd | <0:2.4.6-40.el7_2.6 | 0:2.4.6-40.el7_2.6 |
redhat/httpd | <0:2.4.6-45.el7_3.5 | 0:2.4.6-45.el7_3.5 |
redhat/httpd | <0:2.2.26-57.ep6.el6 | 0:2.2.26-57.ep6.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-14.jbcs.el6 | 1:1.0.2h-14.jbcs.el6 |
redhat/httpd22 | <0:2.2.26-58.ep6.el7 | 0:2.2.26-58.ep6.el7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-14.jbcs.el7 | 1:1.0.2h-14.jbcs.el7 |
redhat/tomcat6 | <0:6.0.41-19_patch_04.ep6.el6 | 0:6.0.41-19_patch_04.ep6.el6 |
redhat/tomcat7 | <0:7.0.54-28_patch_05.ep6.el6 | 0:7.0.54-28_patch_05.ep6.el6 |
redhat/tomcat6 | <0:6.0.41-19_patch_04.ep6.el7 | 0:6.0.41-19_patch_04.ep6.el7 |
redhat/tomcat7 | <0:7.0.54-28_patch_05.ep6.el7 | 0:7.0.54-28_patch_05.ep6.el7 |
redhat/httpd24 | <0:1.1-18.el6 | 0:1.1-18.el6 |
redhat/httpd24-httpd | <0:2.4.27-8.el6 | 0:2.4.27-8.el6 |
redhat/httpd24 | <0:1.1-18.el7 | 0:1.1-18.el7 |
redhat/httpd24-curl | <0:7.47.1-4.el7 | 0:7.47.1-4.el7 |
redhat/httpd24-httpd | <0:2.4.27-8.el7 | 0:2.4.27-8.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-6.el7 | 0:1.7.1-6.el7 |
Apache HTTP server | <=2.2.34 | |
Apache HTTP server | =2.4.0 | |
Apache HTTP server | =2.4.1 | |
Apache HTTP server | =2.4.2 | |
Apache HTTP server | =2.4.3 | |
Apache HTTP server | =2.4.4 | |
Apache HTTP server | =2.4.6 | |
Apache HTTP server | =2.4.7 | |
Apache HTTP server | =2.4.9 | |
Apache HTTP server | =2.4.10 | |
Apache HTTP server | =2.4.12 | |
Apache HTTP server | =2.4.16 | |
Apache HTTP server | =2.4.17 | |
Apache HTTP server | =2.4.18 | |
Apache HTTP server | =2.4.20 | |
Apache HTTP server | =2.4.23 | |
Apache HTTP server | =2.4.25 | |
Apache HTTP server | =2.4.26 | |
Apache HTTP server | =2.4.27 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Apple macOS High Sierra | <10.13.2 | 10.13.2 |
Apple Sierra | ||
Apple El Capitan | ||
redhat/httpd | <2.4.28 | 2.4.28 |
redhat/httpd | <2.2.35 | 2.2.35 |
debian/apache2 | 2.4.59-1~deb11u1 2.4.61-1~deb11u1 2.4.59-1~deb12u1 2.4.61-1~deb12u1 2.4.62-1 |
This issue can be mitigated by configuring httpd to disallow the use of the "Limit" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the "AllowOverride" directive. Refer to Red Hat Bugzilla bug 1490344 for further details: https://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The severity of CVE-2017-9798 is high with a score of 7.5.
An attacker can exploit CVE-2017-9798 by sending a specially crafted request that triggers an information leak from the server's memory.
The Apache HTTP Server versions through 2.2.34 and 2.4.x through 2.4.27 are affected by CVE-2017-9798.
Optionsbleed is a vulnerability in Apache httpd that allows remote attackers to read secret data from process memory.
To mitigate CVE-2017-9798, update Apache httpd to version 2.4.28 or apply the appropriate patch provided by the vendor.