Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apache
Subscribe
|
Http Server
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Netapp
Subscribe
|
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Jboss Core Services
Subscribe
Rhel Software Collections
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-841-1 | apache2 security update |
Debian DLA |
DLA-841-2 | apache2 regression update |
Debian DSA |
DSA-3796-1 | apache2 security update |
Debian DSA |
DSA-3796-2 | sitesummary regression update |
EUVD |
EUVD-2016-9577 | Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. |
Ubuntu USN |
USN-3279-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-3373-1 | Apache HTTP Server vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T17:03:31.158Z
Reserved: 2016-10-18T00:00:00
Link: CVE-2016-8743
No data.
Status : Deferred
Published: 2017-07-27T21:29:00.287
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-8743
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN