CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
93.6%
It was discovered that the Apache HTTP Server incorrectly parsed chunk
headers. A remote attacker could possibly use this issue to perform HTTP
request smuggling attacks. (CVE-2015-3183)
It was discovered that the Apache HTTP Server incorrectly handled the
ap_some_auth_required API. A remote attacker could possibly use this issue
to bypass intended access restrictions. This issue only affected Ubuntu
14.04 LTS and Ubuntu 15.04. (CVE-2015-3185)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 15.04 | noarch | apache2.2-bin | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2 | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-bin | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-bin-dbgsym | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-data | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-dbg | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-dev | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-doc | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-mpm-event | < 2.4.10-9ubuntu1.1 | UNKNOWN |
Ubuntu | 15.04 | noarch | apache2-mpm-itk | < 2.4.10-9ubuntu1.1 | UNKNOWN |