The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-284-1 | apache2 security update |
Debian DSA |
DSA-3325-1 | apache2 security update |
Debian DSA |
DSA-3325-2 | apache2 regression update |
Ubuntu USN |
USN-2686-1 | Apache HTTP Server vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T05:39:31.699Z
Reserved: 2015-04-10T00:00:00
Link: CVE-2015-3183
No data.
Status : Deferred
Published: 2015-07-20T23:59:02.877
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-3183
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN