Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-841-1 | apache2 security update |
Debian DLA |
DLA-841-2 | apache2 regression update |
Debian DSA |
DSA-3796-1 | apache2 security update |
Debian DSA |
DSA-3796-2 | sitesummary regression update |
EUVD |
EUVD-2016-9577 | Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. |
Ubuntu USN |
USN-3279-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-3373-1 | Apache HTTP Server vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T17:03:31.158Z
Reserved: 2016-10-18T00:00:00
Link: CVE-2016-8743
No data.
Status : Deferred
Published: 2017-07-27T21:29:00.287
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-8743
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN