Search for packages
purl | pkg:alpm/archlinux/apache@2.4.27-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-2cgf-57ed-aaap
Aliases: CVE-2017-9798 |
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-h8ut-regn-aaam | When under stress, closing many connections, the HTTP/2 handling code in Apache httpd 2.4.26 would sometimes access memory after it has been freed, resulting in potentially erratic behaviour. |
CVE-2017-9789
|
VCID-kraa-vyt2-aaaa | In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service. |
CVE-2017-9788
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:46:10.812755+00:00 | Arch Linux Importer | Affected by | VCID-2cgf-57ed-aaap | https://security.archlinux.org/AVG-404 | 36.0.0 |
2025-03-28T07:44:47.030171+00:00 | Arch Linux Importer | Fixing | VCID-kraa-vyt2-aaaa | https://security.archlinux.org/AVG-350 | 36.0.0 |
2025-03-28T07:44:46.999825+00:00 | Arch Linux Importer | Fixing | VCID-h8ut-regn-aaam | https://security.archlinux.org/AVG-350 | 36.0.0 |
2024-09-18T02:01:20.421936+00:00 | Arch Linux Importer | Affected by | VCID-2cgf-57ed-aaap | https://security.archlinux.org/AVG-404 | 34.0.1 |
2024-09-18T01:59:48.488974+00:00 | Arch Linux Importer | Fixing | VCID-kraa-vyt2-aaaa | https://security.archlinux.org/AVG-350 | 34.0.1 |
2024-09-18T01:59:48.467654+00:00 | Arch Linux Importer | Fixing | VCID-h8ut-regn-aaam | https://security.archlinux.org/AVG-350 | 34.0.1 |
2024-04-23T19:47:32.915105+00:00 | Arch Linux Importer | Affected by | VCID-2cgf-57ed-aaap | https://security.archlinux.org/AVG-404 | 34.0.0rc4 |
2024-04-23T19:47:31.419842+00:00 | Arch Linux Importer | Fixing | VCID-kraa-vyt2-aaaa | https://security.archlinux.org/AVG-350 | 34.0.0rc4 |
2024-04-23T19:47:31.396892+00:00 | Arch Linux Importer | Fixing | VCID-h8ut-regn-aaam | https://security.archlinux.org/AVG-350 | 34.0.0rc4 |
2024-01-03T22:27:31.071588+00:00 | Arch Linux Importer | Affected by | VCID-2cgf-57ed-aaap | https://security.archlinux.org/AVG-404 | 34.0.0rc1 |
2024-01-03T22:26:04.406652+00:00 | Arch Linux Importer | Fixing | VCID-kraa-vyt2-aaaa | https://security.archlinux.org/AVG-350 | 34.0.0rc1 |
2024-01-03T22:26:04.381275+00:00 | Arch Linux Importer | Fixing | VCID-h8ut-regn-aaam | https://security.archlinux.org/AVG-350 | 34.0.0rc1 |