CVE-2017-9798

7.5 HIGH
Published: September 18, 2017 Modified: November 04, 2025

Description

Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://openwall.com/lists/oss-security/2017/09/18/2
Source: security@apache.org
Mailing List VDB Entry
http://www.debian.org/security/2017/dsa-3980
Source: security@apache.org
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
Source: security@apache.org
Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Source: security@apache.org
Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Source: security@apache.org
Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Source: security@apache.org
Patch Third Party Advisory
http://www.securityfocus.com/bid/100872
Source: security@apache.org
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/105598
Source: security@apache.org
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039387
Source: security@apache.org
Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2882
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2972
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3018
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3113
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3114
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3193
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3194
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3195
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3239
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3240
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3475
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3476
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3477
Source: security@apache.org
Third Party Advisory
https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html
Source: security@apache.org
Exploit Patch Technical Description Third Party Advisory
https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch
Source: security@apache.org
Exploit Patch Technical Description Third Party Advisory
https://github.com/hannob/optionsbleed
Source: security@apache.org
Exploit Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2017-9798
Source: security@apache.org
Third Party Advisory
https://security.gentoo.org/glsa/201710-32
Source: security@apache.org
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180601-0003/
Source: security@apache.org
Third Party Advisory
https://support.apple.com/HT208331
Source: security@apache.org
Third Party Advisory
https://www.exploit-db.com/exploits/42745/
Source: security@apache.org
Exploit Third Party Advisory VDB Entry
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Source: security@apache.org
Patch Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Source: security@apache.org
Patch Third Party Advisory
https://www.tenable.com/security/tns-2019-09
Source: security@apache.org
Third Party Advisory
http://openwall.com/lists/oss-security/2017/09/18/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List VDB Entry
http://seclists.org/fulldisclosure/2024/Sep/22
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2017/dsa-3980
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://www.securityfocus.com/bid/100872
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/105598
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039387
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2882
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2972
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3018
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3113
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3114
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3193
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3194
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3195
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3239
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3240
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3475
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3476
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3477
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Technical Description Third Party Advisory
https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Technical Description Third Party Advisory
https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://github.com/hannob/optionsbleed
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://security-tracker.debian.org/tracker/CVE-2017-9798
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/201710-32
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180601-0003/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.apple.com/HT208331
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.exploit-db.com/exploits/42745/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://www.tenable.com/security/tns-2019-09
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

111 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
EPSS (Exploit Probability)
93.8%
100th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache debian