First published: Mon Aug 24 2015(Updated: )
The httpd packages provide the Apache HTTP Server, a powerful, efficient,<br>and extensible web server.<br>Multiple flaws were found in the way httpd parsed HTTP requests and<br>responses using chunked transfer encoding. A remote attacker could use<br>these flaws to create a specially crafted request, which httpd would decode<br>differently from an HTTP proxy software in front of it, possibly leading to<br>HTTP request smuggling attacks. (CVE-2015-3183)<br>It was discovered that in httpd 2.4, the internal API function<br>ap_some_auth_required() could incorrectly indicate that a request was<br>authenticated even when no authentication was used. An httpd module using<br>this API function could consequently allow access that should have been<br>denied. (CVE-2015-3185)<br>All httpd users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. After installing the<br>updated packages, the httpd service will be restarted automatically.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.6-31.el7_1.1 | 2.4.6-31.el7_1.1 |
redhat/httpd-debuginfo | <2.4.6-31.el7_1.1 | 2.4.6-31.el7_1.1 |
redhat/httpd-devel | <2.4.6-31.el7_1.1 | 2.4.6-31.el7_1.1 |
redhat/httpd-manual | <2.4.6-31.el7_1.1 | 2.4.6-31.el7_1.1 |
redhat/httpd-tools | <2.4.6-31.el7_1.1 | 2.4.6-31.el7_1.1 |
redhat/httpd | <2.4.6-31.el7_1.1 | 2.4.6-31.el7_1.1 |
redhat/httpd-debuginfo | <2.4.6-31.el7_1.1 | 2.4.6-31.el7_1.1 |
redhat/httpd-devel | <2.4.6-31.el7_1.1 | 2.4.6-31.el7_1.1 |
redhat/httpd-tools | <2.4.6-31.el7_1.1 | 2.4.6-31.el7_1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2015:1667 is classified as moderate.
To fix RHSA-2015:1667, you should update the affected httpd packages to version 2.4.6-31.el7_1.1 or later.
All versions of httpd prior to 2.4.6-31.el7_1.1 are affected by RHSA-2015:1667.
RHSA-2015:1667 addresses vulnerabilities that could allow remote attackers to exploit HTTP request and response parsing issues.
Yes, RHSA-2015:1667 applies to httpd-debuginfo and httpd-devel packages, requiring updates for those as well.