First published: Mon Aug 24 2015(Updated: )
The httpd packages provide the Apache HTTP Server, a powerful, efficient,<br>and extensible web server.<br>Multiple flaws were found in the way httpd parsed HTTP requests and<br>responses using chunked transfer encoding. A remote attacker could use<br>these flaws to create a specially crafted request, which httpd would decode<br>differently from an HTTP proxy software in front of it, possibly leading to<br>HTTP request smuggling attacks. (CVE-2015-3183)<br>It was discovered that in httpd 2.4, the internal API function<br>ap_some_auth_required() could incorrectly indicate that a request was<br>authenticated even when no authentication was used. An httpd module using<br>this API function could consequently allow access that should have been<br>denied. (CVE-2015-3185)<br>Note: This update introduces new a new API function,<br>ap_some_authn_required(), which correctly indicates if a request is<br>authenticated. External httpd modules using the old API function should be<br>modified to use the new one to completely resolve this issue.<br>A denial of service flaw was found in the way the mod_lua httpd module<br>processed certain WebSocket Ping requests. A remote attacker could send a<br>specially crafted WebSocket Ping packet that would cause the httpd child<br>process to crash. (CVE-2015-0228)<br>A NULL pointer dereference flaw was found in the way httpd generated<br>certain error responses. A remote attacker could possibly use this flaw to<br>crash the httpd child process using a request that triggers a certain HTTP<br>error. (CVE-2015-0253)<br>All httpd24-httpd users are advised to upgrade to these updated packages,<br>which contain backported patches to correct these issues. After installing<br>the updated packages, the httpd24-httpd service will be restarted<br>automatically.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd24-httpd | <2.4.12-6.el7.1 | 2.4.12-6.el7.1 |
redhat/httpd24-httpd | <2.4.12-6.el7.1 | 2.4.12-6.el7.1 |
redhat/httpd24-httpd-debuginfo | <2.4.12-6.el7.1 | 2.4.12-6.el7.1 |
redhat/httpd24-httpd-devel | <2.4.12-6.el7.1 | 2.4.12-6.el7.1 |
redhat/httpd24-httpd-manual | <2.4.12-6.el7.1 | 2.4.12-6.el7.1 |
redhat/httpd24-httpd-tools | <2.4.12-6.el7.1 | 2.4.12-6.el7.1 |
redhat/httpd24-httpd | <2.4.12-4.el6.2 | 2.4.12-4.el6.2 |
redhat/httpd24-httpd | <2.4.12-4.el6.2 | 2.4.12-4.el6.2 |
redhat/httpd24-httpd-debuginfo | <2.4.12-4.el6.2 | 2.4.12-4.el6.2 |
redhat/httpd24-httpd-devel | <2.4.12-4.el6.2 | 2.4.12-4.el6.2 |
redhat/httpd24-httpd-manual | <2.4.12-4.el6.2 | 2.4.12-4.el6.2 |
redhat/httpd24-httpd-tools | <2.4.12-4.el6.2 | 2.4.12-4.el6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.