{"id":19077,"date":"2017-09-20T04:34:52","date_gmt":"2017-09-19T19:34:52","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-3425-1-apache-http-server-vulnerability\/"},"modified":"2017-09-20T04:34:52","modified_gmt":"2017-09-19T19:34:52","slug":"usn-3425-1-apache-http-server-vulnerability","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-3425-1-apache-http-server-vulnerability\/","title":{"rendered":"USN-3425-1: Apache HTTP Server vulnerability"},"content":{"rendered":"<p>USN-3425-1: Apache HTTP Server vulnerability<\/p>\n<h2>Ubuntu Security Notice USN-3425-1<\/h2>\n<p><em>19th September, 2017<\/em><\/p>\n<h3>apache2 vulnerability<\/h3>\n<p>A security issue affects these releases of Ubuntu and its<br \/>\n    derivatives:<\/p>\n<ul>\n<li>Ubuntu 17.04<\/li>\n<li>Ubuntu 16.04 LTS<\/li>\n<li>Ubuntu 14.04 LTS<\/li>\n<\/ul>\n<h3>Summary<\/h3>\n<p>Apache HTTP Server could be made to expose sensitive information over the<br \/>\nnetwork.\n<\/p>\n<h3>Software description<\/h3>\n<ul>\n<li>apache2<br \/>\n    &#8211; Apache HTTP server<\/p>\n<\/li>\n<\/ul>\n<h3>Details<\/h3>\n<p>Hanno B\u00f6ck discovered that the Apache HTTP Server incorrectly handled<br \/>Limit directives in .htaccess files. In certain configurations, a remote<br \/>attacker could possibly use this issue to read arbitrary server memory,<br \/>including sensitive information. This issue is known as Optionsbleed.<\/p>\n<h3>Update instructions<\/h3>\n<p> The problem can be corrected by updating your system to the following<br \/>\npackage version:<\/p>\n<dl>\n<dt>Ubuntu 17.04:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/apache2\">apache2-bin<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/apache2\/2.4.25-3ubuntu2.3\">2.4.25-3ubuntu2.3<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 16.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/apache2\">apache2-bin<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/apache2\/2.4.18-2ubuntu3.5\">2.4.18-2ubuntu3.5<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 14.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/apache2\">apache2-bin<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/apache2\/2.4.7-1ubuntu4.18\">2.4.7-1ubuntu4.18<\/a><br \/>\n    <\/span>\n  <\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions:<br \/>\n<a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.\n<\/p>\n<p>In general, a standard system update will make all the necessary changes.<\/p>\n<h3>References<\/h3>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-9798\">CVE-2017-9798<\/a><\/p>\n<p>Source: <a href=\"http:\/\/www.ubuntu.com\/usn\/usn-3425-1\/\" target=\"_blank\">USN-3425-1: Apache HTTP Server vulnerability<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-3425-1: Apache HTTP Server vulnerability Ubuntu Security Notice USN-3425-1 19th September, 2017 apache2 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 17.04 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary Apache HTTP Server could be made to expose sensitive information over the network. Software description apache2 &#8211; Apache HTTP server Details Hanno B\u00f6ck discovered that the Apache HTTP Server incorrectly handledLimit directives in .htaccess files. In certain configurations, a remoteattacker could possibly use this issue to read arbitrary server memory,including sensitive information. This issue is known as Optionsbleed. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 17.04: apache2-bin 2.4.25-3ubuntu2.3 Ubuntu 16.04 LTS: apache2-bin 2.4.18-2ubuntu3.5 Ubuntu 14.04 LTS: apache2-bin 2.4.7-1ubuntu4.18 To update your system, please follow these instructions: https:\/\/wiki.ubuntu.com\/Security\/Upgrades. In general, a standard system update will make all <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-3425-1-apache-http-server-vulnerability\/\" title=\"USN-3425-1: Apache HTTP Server vulnerability\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-19077","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/19077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=19077"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/19077\/revisions"}],"predecessor-version":[{"id":19078,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/19077\/revisions\/19078"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=19077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=19077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=19077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}