7.7 High
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.072 Low
EPSS
Percentile
93.9%
It was discovered that the Apache HTTP Server incorrectly parsed chunk
headers. A remote attacker could possibly use this issue to perform HTTP
request smuggling attacks. (CVE-2015-3183)
It was discovered that the Apache HTTP Server incorrectly handled the
ap_some_auth_required API. A remote attacker could possibly use this issue
to bypass intended access restrictions. This issue only affected Ubuntu
14.04 LTS and Ubuntu 15.04. (CVE-2015-3185)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 15.04 | noarch | apache2.2-bin | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2 | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-bin | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-bin-dbgsym | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-data | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-dbg | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-dev | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-doc | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-mpm-event | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-mpm-itk | < 2.4.10-9ubuntu1.1 | UNKNOWN |