First published: Thu Jul 16 2015(Updated: )
Apache HTTP Server 2.4.16 release fixes the following issue: *) SECURITY: <a href="https://access.redhat.com/security/cve/CVE-2015-3183">CVE-2015-3183</a> (cve.mitre.org) core: Fix chunk header parsing defect. Remove apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN filter, parse chunks in a single pass with zero copy. Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext authorized characters. [Graham Leggett, Yann Ylavic] External References: <a href="http://www.apache.org/dist/httpd/CHANGES_2.4.16">http://www.apache.org/dist/httpd/CHANGES_2.4.16</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | >=2.2.0<2.2.31 | |
Apache HTTP server | >=2.4.0<2.4.16 | |
Apache HTTP server | <=2.4.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.