First published: Fri May 24 2024(Updated: )
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.2 | 17.5.0 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 F5OS | =1.7.0>=1.5.1<=1.5.2 | |
F5 F5OS | >=1.6.0<=1.6.2 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability F5-K000139764 is classified as critical due to its potential impact on the Apache HTTP Server.
To mitigate F5-K000139764, update your Apache HTTP Server to version 2.4.58 or later.
F5-K000139764 affects specific versions of F5 BIG-IP, F5OS-A, F5OS-C, and Traffix SDC.
Exploitation of F5-K000139764 can lead to HTTP response splitting, allowing attackers to manipulate or control backend responses.
F5-K000139764 was disclosed with significant urgency due to its potential to exploit vulnerabilities in widely used server systems.