FreeBSD : apache22 -- chunk header parsing defect (29083f8e-2ca8-11e5-86ff-14dae9d210b8)

medium Nessus Plugin ID 84860

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Apache Foundation reports :

CVE-2015-3183 core: Fix chunk header parsing defect. Remove apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN filter, parse chunks in a single pass with zero copy. Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext authorized characters.

Solution

Update the affected packages.

See Also

http://www.apache.org/dist/httpd/Announcement2.2.html

http://www.nessus.org/u?9fdaabfc

http://www.nessus.org/u?04efdaa2

Plugin Details

Severity: Medium

ID: 84860

File Name: freebsd_pkg_29083f8e2ca811e586ff14dae9d210b8.nasl

Version: 2.8

Type: local

Published: 7/20/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apache22-peruser-mpm, p-cpe:/a:freebsd:freebsd:apache22-itk-mpm, p-cpe:/a:freebsd:freebsd:apache22, cpe:/o:freebsd:freebsd, p-cpe:/a:freebsd:freebsd:apache22-event-mpm, p-cpe:/a:freebsd:freebsd:apache22-worker-mpm

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/17/2015

Vulnerability Publication Date: 6/24/2015

Reference Information

CVE: CVE-2015-3183