CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
93.7%
Issue Overview:
It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185)
Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3183)
A NULL pointer dereference flaw was found in the way httpd generated certain error responses. A remote attacker could possibly use this flaw crash the httpd child process using a request that triggers a certain HTTP error. (CVE-2015-0253)
A denial of service flaw was found in the way the mod_lua httpd module processed certain WebSocket Ping requests. A remote attacker could send a specially crafted WebSocket Ping packet that would cause the httpd child process to crash. (CVE-2015-0228)
Affected Packages:
httpd24
Issue Correction:
Run yum update httpd24 to update your system.
New Packages:
i686:
mod24_ldap-2.4.16-1.62.amzn1.i686
mod24_session-2.4.16-1.62.amzn1.i686
mod24_ssl-2.4.16-1.62.amzn1.i686
httpd24-devel-2.4.16-1.62.amzn1.i686
mod24_proxy_html-2.4.16-1.62.amzn1.i686
httpd24-tools-2.4.16-1.62.amzn1.i686
httpd24-2.4.16-1.62.amzn1.i686
httpd24-debuginfo-2.4.16-1.62.amzn1.i686
noarch:
httpd24-manual-2.4.16-1.62.amzn1.noarch
src:
httpd24-2.4.16-1.62.amzn1.src
x86_64:
httpd24-devel-2.4.16-1.62.amzn1.x86_64
httpd24-tools-2.4.16-1.62.amzn1.x86_64
mod24_ldap-2.4.16-1.62.amzn1.x86_64
mod24_proxy_html-2.4.16-1.62.amzn1.x86_64
httpd24-2.4.16-1.62.amzn1.x86_64
mod24_session-2.4.16-1.62.amzn1.x86_64
mod24_ssl-2.4.16-1.62.amzn1.x86_64
httpd24-debuginfo-2.4.16-1.62.amzn1.x86_64
Red Hat: CVE-2015-0228, CVE-2015-0253, CVE-2015-3183, CVE-2015-3185
Mitre: CVE-2015-0228, CVE-2015-0253, CVE-2015-3183, CVE-2015-3185
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | mod24_ldap | < 2.4.16-1.62.amzn1 | mod24_ldap-2.4.16-1.62.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mod24_session | < 2.4.16-1.62.amzn1 | mod24_session-2.4.16-1.62.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mod24_ssl | < 2.4.16-1.62.amzn1 | mod24_ssl-2.4.16-1.62.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd24-devel | < 2.4.16-1.62.amzn1 | httpd24-devel-2.4.16-1.62.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mod24_proxy_html | < 2.4.16-1.62.amzn1 | mod24_proxy_html-2.4.16-1.62.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd24-tools | < 2.4.16-1.62.amzn1 | httpd24-tools-2.4.16-1.62.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd24 | < 2.4.16-1.62.amzn1 | httpd24-2.4.16-1.62.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd24-debuginfo | < 2.4.16-1.62.amzn1 | httpd24-debuginfo-2.4.16-1.62.amzn1.i686.rpm |
Amazon Linux | 1 | noarch | httpd24-manual | < 2.4.16-1.62.amzn1 | httpd24-manual-2.4.16-1.62.amzn1.noarch.rpm |
Amazon Linux | 1 | x86_64 | httpd24-devel | < 2.4.16-1.62.amzn1 | httpd24-devel-2.4.16-1.62.amzn1.x86_64.rpm |