Description
The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-284-1 | apache2 security update |
Debian DSA |
DSA-3325-1 | apache2 security update |
Debian DSA |
DSA-3325-2 | apache2 regression update |
Ubuntu USN |
USN-2686-1 | Apache HTTP Server vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T05:39:31.699Z
Reserved: 2015-04-10T00:00:00.000Z
Link: CVE-2015-3183
No data.
Status : Modified
Published: 2015-07-20T23:59:02.877
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-3183
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN