{
  "document": {
    "aggregate_severity": {
      "text": "High"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos6els/vex/2017/cve-2017-9798-els_os-centos6els.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-17T20:47:44Z",
      "generator": {
        "date": "2026-04-17T20:47:44Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CVE-2017-9798-ELS_OS-CENTOS6ELS",
      "initial_release_date": "2017-09-18T15:29:00Z",
      "revision_history": [
        {
          "date": "2017-09-18T15:29:00Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-13T09:43:55Z",
          "number": "2",
          "summary": "Official Publication"
        },
        {
          "date": "2026-04-17T20:47:44Z",
          "number": "3",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "3"
    },
    "title": "Security update on CVE-2017-9798"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 6",
                "product": {
                  "name": "Community Enterprise Operating System 6",
                  "product_id": "CentOS-6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-72.el6.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-72.el6.noarch",
                  "product_id": "httpd-manual-0:2.2.15-72.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/httpd-manual@2.2.15-72.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-71.el6.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-71.el6.noarch",
                  "product_id": "httpd-manual-0:2.2.15-71.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/httpd-manual@2.2.15-71.el6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-72.el6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-72.el6.x86_64",
                  "product_id": "mod_ssl-1:2.2.15-72.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/mod_ssl@2.2.15-72.el6?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-72.el6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-72.el6.x86_64",
                  "product_id": "httpd-devel-0:2.2.15-72.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/httpd-devel@2.2.15-72.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-72.el6.x86_64",
                "product": {
                  "name": "httpd-0:2.2.15-72.el6.x86_64",
                  "product_id": "httpd-0:2.2.15-72.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/httpd@2.2.15-72.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-72.el6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-72.el6.x86_64",
                  "product_id": "httpd-tools-0:2.2.15-72.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/httpd-tools@2.2.15-72.el6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-72.el6.i686",
                "product": {
                  "name": "httpd-devel-0:2.2.15-72.el6.i686",
                  "product_id": "httpd-devel-0:2.2.15-72.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/httpd-devel@2.2.15-72.el6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els6.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els6.noarch",
                  "product_id": "httpd-manual-0:2.2.15-72.el6.tuxcare.els6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-manual@2.2.15-72.el6.tuxcare.els6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els10.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els10.noarch",
                  "product_id": "httpd-manual-0:2.2.15-72.el6.tuxcare.els10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-manual@2.2.15-72.el6.tuxcare.els10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els4.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els4.noarch",
                  "product_id": "httpd-manual-0:2.2.15-72.el6.tuxcare.els4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-manual@2.2.15-72.el6.tuxcare.els4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els9.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els9.noarch",
                  "product_id": "httpd-manual-0:2.2.15-72.el6.tuxcare.els9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-manual@2.2.15-72.el6.tuxcare.els9?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els8.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els8.noarch",
                  "product_id": "httpd-manual-0:2.2.15-72.el6.tuxcare.els8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-manual@2.2.15-72.el6.tuxcare.els8?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-71.el6.cloudlinux.els.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-71.el6.cloudlinux.els.noarch",
                  "product_id": "httpd-manual-0:2.2.15-71.el6.cloudlinux.els.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-manual@2.2.15-71.el6.cloudlinux.els?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els5.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els5.noarch",
                  "product_id": "httpd-manual-0:2.2.15-72.el6.tuxcare.els5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-manual@2.2.15-72.el6.tuxcare.els5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-72.el6.cloudlinux.els.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-72.el6.cloudlinux.els.noarch",
                  "product_id": "httpd-manual-0:2.2.15-72.el6.cloudlinux.els.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-manual@2.2.15-72.el6.cloudlinux.els?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els7.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els7.noarch",
                  "product_id": "httpd-manual-0:2.2.15-72.el6.tuxcare.els7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-manual@2.2.15-72.el6.tuxcare.els7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-72.el6.tuxcare.els10.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-72.el6.tuxcare.els10.x86_64",
                  "product_id": "mod_ssl-1:2.2.15-72.el6.tuxcare.els10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/mod_ssl@2.2.15-72.el6.tuxcare.els10?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-72.el6.tuxcare.els10.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-72.el6.tuxcare.els10.x86_64",
                  "product_id": "httpd-devel-0:2.2.15-72.el6.tuxcare.els10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-devel@2.2.15-72.el6.tuxcare.els10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-72.el6.tuxcare.els10.x86_64",
                "product": {
                  "name": "httpd-0:2.2.15-72.el6.tuxcare.els10.x86_64",
                  "product_id": "httpd-0:2.2.15-72.el6.tuxcare.els10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd@2.2.15-72.el6.tuxcare.els10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-72.el6.tuxcare.els10.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-72.el6.tuxcare.els10.x86_64",
                  "product_id": "httpd-tools-0:2.2.15-72.el6.tuxcare.els10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-tools@2.2.15-72.el6.tuxcare.els10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-72.el6.tuxcare.els10.i686",
                "product": {
                  "name": "httpd-devel-0:2.2.15-72.el6.tuxcare.els10.i686",
                  "product_id": "httpd-devel-0:2.2.15-72.el6.tuxcare.els10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/httpd-devel@2.2.15-72.el6.tuxcare.els10?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els6.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els6.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-72.el6.tuxcare.els6.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els10.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els10.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-72.el6.tuxcare.els10.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els4.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els4.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-72.el6.tuxcare.els4.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els9.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els9.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-72.el6.tuxcare.els9.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els8.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els8.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-72.el6.tuxcare.els8.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-71.el6.cloudlinux.els.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-manual-0:2.2.15-71.el6.cloudlinux.els.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-71.el6.cloudlinux.els.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els5.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-72.el6.tuxcare.els5.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-72.el6.cloudlinux.els.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-manual-0:2.2.15-72.el6.cloudlinux.els.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-72.el6.cloudlinux.els.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-72.el6.tuxcare.els7.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els7.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-72.el6.tuxcare.els7.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-72.el6.tuxcare.els10.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:mod_ssl-1:2.2.15-72.el6.tuxcare.els10.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-72.el6.tuxcare.els10.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-72.el6.tuxcare.els10.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-devel-0:2.2.15-72.el6.tuxcare.els10.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-72.el6.tuxcare.els10.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-72.el6.tuxcare.els10.i686 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-devel-0:2.2.15-72.el6.tuxcare.els10.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-72.el6.tuxcare.els10.i686",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-72.el6.tuxcare.els10.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-0:2.2.15-72.el6.tuxcare.els10.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-72.el6.tuxcare.els10.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-72.el6.tuxcare.els10.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-tools-0:2.2.15-72.el6.tuxcare.els10.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-72.el6.tuxcare.els10.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-72.el6.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-manual-0:2.2.15-72.el6.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-72.el6.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-71.el6.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-manual-0:2.2.15-71.el6.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-71.el6.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-72.el6.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:mod_ssl-1:2.2.15-72.el6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-72.el6.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-72.el6.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-devel-0:2.2.15-72.el6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-72.el6.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-72.el6.i686 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-devel-0:2.2.15-72.el6.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-72.el6.i686",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-72.el6.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-0:2.2.15-72.el6.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-72.el6.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-72.el6.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:httpd-tools-0:2.2.15-72.el6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-72.el6.x86_64",
        "relates_to_product_reference": "CentOS-6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:httpd-0:2.2.15-72.el6.tuxcare.els10.x86_64",
          "CentOS-6:httpd-devel-0:2.2.15-72.el6.tuxcare.els10.i686",
          "CentOS-6:httpd-devel-0:2.2.15-72.el6.tuxcare.els10.x86_64",
          "CentOS-6:httpd-manual-0:2.2.15-71.el6.cloudlinux.els.noarch",
          "CentOS-6:httpd-manual-0:2.2.15-72.el6.cloudlinux.els.noarch",
          "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els10.noarch",
          "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els4.noarch",
          "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els5.noarch",
          "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els6.noarch",
          "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els7.noarch",
          "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els8.noarch",
          "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els9.noarch",
          "CentOS-6:httpd-tools-0:2.2.15-72.el6.tuxcare.els10.x86_64",
          "CentOS-6:mod_ssl-1:2.2.15-72.el6.tuxcare.els10.x86_64"
        ],
        "known_affected": [
          "CentOS-6:httpd-0:2.2.15-72.el6.x86_64",
          "CentOS-6:httpd-devel-0:2.2.15-72.el6.i686",
          "CentOS-6:httpd-devel-0:2.2.15-72.el6.x86_64",
          "CentOS-6:httpd-manual-0:2.2.15-71.el6.noarch",
          "CentOS-6:httpd-manual-0:2.2.15-72.el6.noarch",
          "CentOS-6:httpd-tools-0:2.2.15-72.el6.x86_64",
          "CentOS-6:mod_ssl-1:2.2.15-72.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "http://openwall.com/lists/oss-security/2017/09/18/2",
          "url": "http://openwall.com/lists/oss-security/2017/09/18/2"
        },
        {
          "category": "external",
          "summary": "http://www.debian.org/security/2017/dsa-3980",
          "url": "http://www.debian.org/security/2017/dsa-3980"
        },
        {
          "category": "external",
          "summary": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
          "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
        },
        {
          "category": "external",
          "summary": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
          "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
        },
        {
          "category": "external",
          "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
          "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
        },
        {
          "category": "external",
          "summary": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
          "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
        },
        {
          "category": "external",
          "summary": "http://www.securityfocus.com/bid/100872",
          "url": "http://www.securityfocus.com/bid/100872"
        },
        {
          "category": "external",
          "summary": "http://www.securityfocus.com/bid/105598",
          "url": "http://www.securityfocus.com/bid/105598"
        },
        {
          "category": "external",
          "summary": "http://www.securitytracker.com/id/1039387",
          "url": "http://www.securitytracker.com/id/1039387"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:2882",
          "url": "https://access.redhat.com/errata/RHSA-2017:2882"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:2972",
          "url": "https://access.redhat.com/errata/RHSA-2017:2972"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:3018",
          "url": "https://access.redhat.com/errata/RHSA-2017:3018"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:3113",
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:3114",
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:3193",
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:3194",
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:3195",
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:3239",
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:3240",
          "url": "https://access.redhat.com/errata/RHSA-2017:3240"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:3475",
          "url": "https://access.redhat.com/errata/RHSA-2017:3475"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:3476",
          "url": "https://access.redhat.com/errata/RHSA-2017:3476"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2017:3477",
          "url": "https://access.redhat.com/errata/RHSA-2017:3477"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch",
          "url": "https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch"
        },
        {
          "category": "external",
          "summary": "https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a",
          "url": "https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a"
        },
        {
          "category": "external",
          "summary": "https://github.com/hannob/optionsbleed",
          "url": "https://github.com/hannob/optionsbleed"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "category": "external",
          "summary": "https://security-tracker.debian.org/tracker/CVE-2017-9798",
          "url": "https://security-tracker.debian.org/tracker/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://security.gentoo.org/glsa/201710-32",
          "url": "https://security.gentoo.org/glsa/201710-32"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20180601-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20180601-0003/"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/HT208331",
          "url": "https://support.apple.com/HT208331"
        },
        {
          "category": "external",
          "summary": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us"
        },
        {
          "category": "external",
          "summary": "https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch",
          "url": "https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch"
        },
        {
          "category": "external",
          "summary": "https://www.exploit-db.com/exploits/42745/",
          "url": "https://www.exploit-db.com/exploits/42745/"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
          "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
          "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
        },
        {
          "category": "external",
          "summary": "https://www.tenable.com/security/tns-2019-09",
          "url": "https://www.tenable.com/security/tns-2019-09"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2024/Sep/22",
          "url": "http://seclists.org/fulldisclosure/2024/Sep/22"
        }
      ],
      "release_date": "2017-09-18T15:29:00Z",
      "remediations": [
        {
          "category": "none_available",
          "details": "Affected",
          "product_ids": [
            "CentOS-6:httpd-0:2.2.15-72.el6.x86_64",
            "CentOS-6:httpd-devel-0:2.2.15-72.el6.i686",
            "CentOS-6:httpd-devel-0:2.2.15-72.el6.x86_64",
            "CentOS-6:httpd-manual-0:2.2.15-71.el6.noarch",
            "CentOS-6:httpd-manual-0:2.2.15-72.el6.noarch",
            "CentOS-6:httpd-tools-0:2.2.15-72.el6.x86_64",
            "CentOS-6:mod_ssl-1:2.2.15-72.el6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:httpd-0:2.2.15-72.el6.tuxcare.els10.x86_64",
            "CentOS-6:httpd-0:2.2.15-72.el6.x86_64",
            "CentOS-6:httpd-devel-0:2.2.15-72.el6.i686",
            "CentOS-6:httpd-devel-0:2.2.15-72.el6.tuxcare.els10.i686",
            "CentOS-6:httpd-devel-0:2.2.15-72.el6.tuxcare.els10.x86_64",
            "CentOS-6:httpd-devel-0:2.2.15-72.el6.x86_64",
            "CentOS-6:httpd-manual-0:2.2.15-71.el6.cloudlinux.els.noarch",
            "CentOS-6:httpd-manual-0:2.2.15-71.el6.noarch",
            "CentOS-6:httpd-manual-0:2.2.15-72.el6.cloudlinux.els.noarch",
            "CentOS-6:httpd-manual-0:2.2.15-72.el6.noarch",
            "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els10.noarch",
            "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els4.noarch",
            "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els5.noarch",
            "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els6.noarch",
            "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els7.noarch",
            "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els8.noarch",
            "CentOS-6:httpd-manual-0:2.2.15-72.el6.tuxcare.els9.noarch",
            "CentOS-6:httpd-tools-0:2.2.15-72.el6.tuxcare.els10.x86_64",
            "CentOS-6:httpd-tools-0:2.2.15-72.el6.x86_64",
            "CentOS-6:mod_ssl-1:2.2.15-72.el6.tuxcare.els10.x86_64",
            "CentOS-6:mod_ssl-1:2.2.15-72.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}