Lucene search

K
centosCentOS ProjectCESA-2015:1668
HistoryAug 24, 2015 - 6:23 p.m.

httpd, mod_ssl security update

2015-08-2418:23:20
CentOS Project
lists.centos.org
73

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.062 Low

EPSS

Percentile

93.6%

CentOS Errata and Security Advisory CESA-2015:1668

The httpd packages provide the Apache HTTP Server, a powerful, efficient,
and extensible web server.

Multiple flaws were found in the way httpd parsed HTTP requests and
responses using chunked transfer encoding. A remote attacker could use
these flaws to create a specially crafted request, which httpd would decode
differently from an HTTP proxy software in front of it, possibly leading to
HTTP request smuggling attacks. (CVE-2015-3183)

All httpd users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
updated packages, the httpd service will be restarted automatically.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2015-August/083506.html

Affected packages:
httpd
httpd-devel
httpd-manual
httpd-tools
mod_ssl

Upstream details at:
https://access.redhat.com/errata/RHSA-2015:1668

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.062 Low

EPSS

Percentile

93.6%