Optionsbleed Bug Leaks Apache Server Memory (Bug known since 2014)

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
Certain Apache server configurations can leak server memory content via a vulnerability called Optionsbleed — tracked as CVE-2017-9798 — and detailed on Monday by security researcher Hanno Böck.

The vulnerability is similar to Heartbleed, in the way that attackers can query servers and trick Apache in responding with more data than it intended.

Böck says Optionsbleed is not as severe as Heartbleed because it leaks content processed by the Apache web server process only and not memory content from the underlying machine, including other applications. This means the leaked data is limited to whatever Apache is processing, which is mostly the content of web pages.

Nonetheless, the danger remains, as Optionsbleed could leak content from pages that are only available to authenticated users.

How Optionsbleed works
To understand how Optionsbleed affects servers, you need to know how web servers work. Whenever a client — such as a web browser — makes a request to a server, it usually makes a GET or POST request that retrieves content from the server — a web page or a downloadable file.

Apache servers support many other requests — technically named "methods" — such as PUT, PATCH, HEAD, and more. These methods have been added to Apache releases across time, and are not supported by all servers. In addition, server admins also block access to some of the methods.

To avoid making server requests that go into a black hole, Apache servers support the OPTIONS method. A client can query the server with an OPTIONS request and the server replies with what methods it is allowed to answer.


Bug known since 2014
A user commenting on Böck's discovery pointed out that this bug was previously described in a 2014 paper by researchers from the Old Dominion University in the US.

Despite the issue being known for three years, and re-reported these past weeks, the Apache web server team has not released new server binaries that address the bug. Only patch files are available, for Apache branches 2.4.x and 2.2.x.

Apache servers running on shared environments, where several users deploy different .htaccess files on the same machine, are the ones affected by Optionsbleed the most. Nonetheless, all server owners are advised to install the patches just to be sure.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top