CVE-2015-3183

NameCVE-2015-3183
DescriptionThe chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-284-1, DSA-3325-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apache2 (PTS)bullseye2.4.62-1~deb11u1fixed
bullseye (security)2.4.62-1~deb11u2fixed
bookworm, bookworm (security)2.4.62-1~deb12u2fixed
sid, trixie2.4.62-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
apache2sourcesqueeze2.2.16-6+squeeze15DLA-284-1
apache2sourcewheezy2.2.22-13+deb7u5DSA-3325-1
apache2sourcejessie2.4.10-10+deb8u1DSA-3325-1
apache2source(unstable)2.4.16-1

Notes

https://www.apache.org/dist/httpd/Announcement2.4.txt
http://web.archive.org/web/20150918024815/http://www.apache.org:80/dist/httpd/CHANGES_2.4.16
http://svn.apache.org/viewvc?view=revision&revision=1684515
http://svn.apache.org/viewvc?view=revision&revision=1687338 (2.2.x)
http://svn.apache.org/viewvc?view=revision&revision=1687339 (2.2.x)

Search for package or bug name: Reporting problems