First published: Tue Apr 01 2014(Updated: )
The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.2.29 | 2.2.29 |
redhat/httpd | <2.4.11 | 2.4.11 |
Apache Http Server | =2.2.0 | |
Apache Http Server | =2.2.2 | |
Apache Http Server | =2.2.3 | |
Apache Http Server | =2.2.4 | |
Apache Http Server | =2.2.5 | |
Apache Http Server | =2.2.6 | |
Apache Http Server | =2.2.8 | |
Apache Http Server | =2.2.9 | |
Apache Http Server | =2.2.10 | |
Apache Http Server | =2.2.11 | |
Apache Http Server | =2.2.12 | |
Apache Http Server | =2.2.13 | |
Apache Http Server | =2.2.14 | |
Apache Http Server | =2.2.15 | |
Apache Http Server | =2.2.16 | |
Apache Http Server | =2.2.17 | |
Apache Http Server | =2.2.18 | |
Apache Http Server | =2.2.19 | |
Apache Http Server | =2.2.20 | |
Apache Http Server | =2.2.21 | |
Apache Http Server | =2.2.22 | |
Apache Http Server | =2.2.23 | |
Apache Http Server | =2.2.24 | |
Apache Http Server | =2.2.25 | |
Apache Http Server | =2.2.26 | |
Apache Http Server | =2.2.27 | |
Apache Http Server | =2.4.1 | |
Apache Http Server | =2.4.2 | |
Apache Http Server | =2.4.3 | |
Apache Http Server | =2.4.4 | |
Apache Http Server | =2.4.6 | |
Apache Http Server | =2.4.7 | |
Apache Http Server | =2.4.9 | |
Apache Http Server | =2.4.10 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.3 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Red Hat JBoss Enterprise Web Server | =3.0.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat JBoss Enterprise Web Server | =2.0.0 | |
Red Hat Enterprise Linux | =5.0 | |
Oracle Enterprise Manager Ops Center | <12.1.4 | |
Oracle Enterprise Manager Ops Center | =12.1.4 | |
Oracle Enterprise Manager Ops Center | =12.2.0 | |
Oracle Enterprise Manager Ops Center | =12.2.1 | |
Oracle Enterprise Manager Ops Center | =12.3.0 | |
Oracle HTTP Server | =10.1.3.5.0 | |
Oracle HTTP Server | =11.1.1.7.0 | |
Oracle HTTP Server | =12.1.2.0 | |
Oracle HTTP Server | =12.1.3.0 | |
Oracle Linux | =6 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.2 | |
Apple iOS and macOS | <10.10.4 | |
Apple iOS and macOS | <5.0.3 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5704 is considered a low-severity vulnerability as the vendor has stated it is not a security issue in Apache HTTP Server.
To mitigate CVE-2013-5704, upgrade to Apache HTTP Server version 2.2.29 or 2.4.11 or later.
CVE-2013-5704 affects Apache HTTP Server versions 2.2.22 and earlier, including various other specified versions.
No, CVE-2013-5704 does not lead to remote code execution but allows for header manipulation.
The risk from CVE-2013-5704 is limited; however, it can be leveraged in specific scenarios to bypass security headers.