First published: Thu Jul 16 2015(Updated: )
Apache HTTP Server 2.4.16 release fixes the following issue: *) SECURITY: <a href="https://access.redhat.com/security/cve/CVE-2015-3183">CVE-2015-3183</a> (cve.mitre.org) core: Fix chunk header parsing defect. Remove apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN filter, parse chunks in a single pass with zero copy. Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext authorized characters. [Graham Leggett, Yann Ylavic] External References: <a href="http://www.apache.org/dist/httpd/CHANGES_2.4.16">http://www.apache.org/dist/httpd/CHANGES_2.4.16</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.2.31 | 2.2.31 |
redhat/httpd | <2.4.16 | 2.4.16 |
Apache Http Server | >=2.2.0<2.2.31 | |
Apache Http Server | >=2.4.0<2.4.16 | |
Apache Http Server | <=2.4.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3183 is classified as a medium severity vulnerability that affects chunk header parsing in Apache HTTP Server.
To fix CVE-2015-3183, update your Apache HTTP Server to version 2.4.16 or later, or version 2.2.31 or later.
CVE-2015-3183 affects Apache HTTP Server versions prior to 2.4.16 and versions prior to 2.2.31.
CVE-2015-3183 represents a core security issue related to defect in chunk header parsing.
There are no known workarounds for CVE-2015-3183, and the recommended action is to update to a secure version.