There's a bug in the widely used Apache Web Server that causes servers to leak pieces of arbitrary memory in a way that could expose passwords or other secrets, a freelance journalist has disclosed.
Like the better-known GET and POST requests, OPTIONS is a type of HTTP method that allows users to determine which HTTP requests are supported by the server.
Normally, a server will respond with GET, POST, OPTIONS, and any other supported methods.
Under certain conditions, however, responses from Apache Web Server include the data stored in computer memory.
Patches are available here and here.
The best-known vulnerability to leak potentially serious server memory was the Heartbleed bug located in the widely used OpenSSL cryptography library.