Lucene search

K
nvd[email protected]NVD:CVE-2013-5704
HistoryApr 15, 2014 - 10:55 a.m.

CVE-2013-5704

2014-04-1510:55:11
web.nvd.nist.gov
2

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

4.8 Medium

AI Score

Confidence

High

0.467 Medium

EPSS

Percentile

97.5%

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass โ€œRequestHeader unsetโ€ directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states โ€œthis is not a security issue in httpd as such.โ€

Affected configurations

NVD
Node
apachehttp_serverMatch2.2.0
OR
apachehttp_serverMatch2.2.2
OR
apachehttp_serverMatch2.2.3
OR
apachehttp_serverMatch2.2.4
OR
apachehttp_serverMatch2.2.5
OR
apachehttp_serverMatch2.2.6
OR
apachehttp_serverMatch2.2.8
OR
apachehttp_serverMatch2.2.9
OR
apachehttp_serverMatch2.2.10
OR
apachehttp_serverMatch2.2.11
OR
apachehttp_serverMatch2.2.12
OR
apachehttp_serverMatch2.2.13
OR
apachehttp_serverMatch2.2.14
OR
apachehttp_serverMatch2.2.15
OR
apachehttp_serverMatch2.2.16
OR
apachehttp_serverMatch2.2.17
OR
apachehttp_serverMatch2.2.18
OR
apachehttp_serverMatch2.2.19
OR
apachehttp_serverMatch2.2.20
OR
apachehttp_serverMatch2.2.21
OR
apachehttp_serverMatch2.2.22
OR
apachehttp_serverMatch2.2.23
OR
apachehttp_serverMatch2.2.24
OR
apachehttp_serverMatch2.2.25
OR
apachehttp_serverMatch2.2.26
OR
apachehttp_serverMatch2.2.27
OR
apachehttp_serverMatch2.4.1
OR
apachehttp_serverMatch2.4.2
OR
apachehttp_serverMatch2.4.3
OR
apachehttp_serverMatch2.4.4
OR
apachehttp_serverMatch2.4.6
OR
apachehttp_serverMatch2.4.7
OR
apachehttp_serverMatch2.4.9
OR
apachehttp_serverMatch2.4.10
Node
redhatenterprise_linux_desktopMatch6.0
OR
redhatenterprise_linux_desktopMatch7.0
OR
redhatenterprise_linux_eusMatch7.3
OR
redhatenterprise_linux_eusMatch7.4
OR
redhatenterprise_linux_eusMatch7.5
OR
redhatenterprise_linux_eusMatch7.6
OR
redhatenterprise_linux_eusMatch7.7
OR
redhatenterprise_linux_serverMatch6.0
OR
redhatenterprise_linux_serverMatch7.0
OR
redhatenterprise_linux_server_ausMatch7.3
OR
redhatenterprise_linux_server_ausMatch7.4
OR
redhatenterprise_linux_server_ausMatch7.6
OR
redhatenterprise_linux_server_ausMatch7.7
OR
redhatenterprise_linux_server_tusMatch7.3
OR
redhatenterprise_linux_server_tusMatch7.6
OR
redhatenterprise_linux_server_tusMatch7.7
OR
redhatenterprise_linux_workstationMatch6.0
OR
redhatenterprise_linux_workstationMatch7.0
Node
redhatjboss_enterprise_web_serverMatch3.0.0
AND
redhatenterprise_linuxMatch6.0
OR
redhatenterprise_linuxMatch7.0
Node
redhatjboss_enterprise_web_serverMatch2.0.0
AND
redhatenterprise_linuxMatch5.0
OR
redhatenterprise_linuxMatch6.0
OR
redhatenterprise_linuxMatch7.0
Node
oracleenterprise_manager_ops_centerRange<12.1.4
OR
oracleenterprise_manager_ops_centerMatch12.1.4
OR
oracleenterprise_manager_ops_centerMatch12.2.0
OR
oracleenterprise_manager_ops_centerMatch12.2.1
OR
oracleenterprise_manager_ops_centerMatch12.3.0
OR
oraclehttp_serverMatch10.1.3.5.0
OR
oraclehttp_serverMatch11.1.1.7.0
OR
oraclehttp_serverMatch12.1.2.0
OR
oraclehttp_serverMatch12.1.3.0
OR
oraclelinuxMatch6-
OR
oraclesolarisMatch11.2
Node
applemac_os_xRange<10.10.4
OR
applemac_os_x_serverRange<5.0.3
Node
canonicalubuntu_linuxMatch10.04-
OR
canonicalubuntu_linuxMatch12.04-
OR
canonicalubuntu_linuxMatch14.04esm
OR
canonicalubuntu_linuxMatch14.10

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

4.8 Medium

AI Score

Confidence

High

0.467 Medium

EPSS

Percentile

97.5%