CVE-2015-3183

NameCVE-2015-3183
DescriptionThe chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-284-1, DSA-3325-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apache2 (PTS)wheezy2.2.22-13+deb7u6fixed
wheezy (security)2.2.22-13+deb7u12fixed
jessie (security), jessie2.4.10-10+deb8u11fixed
stretch (security), stretch2.4.25-3+deb9u3fixed
buster, sid2.4.29-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
apache2source(unstable)2.4.16-1medium
apache2sourcejessie2.4.10-10+deb8u1mediumDSA-3325-1
apache2sourcesqueeze2.2.16-6+squeeze15mediumDLA-284-1
apache2sourcewheezy2.2.22-13+deb7u5mediumDSA-3325-1

Notes

https://www.apache.org/dist/httpd/Announcement2.4.txt
http://web.archive.org/web/20150918024815/http://www.apache.org:80/dist/httpd/CHANGES_2.4.16
http://svn.apache.org/viewvc?view=revision&revision=1684515
http://svn.apache.org/viewvc?view=revision&revision=1687338 (2.2.x)
http://svn.apache.org/viewvc?view=revision&revision=1687339 (2.2.x)

Search for package or bug name: Reporting problems