[prev in list] [next in list] [prev in thread] [next in thread]
List: apache-cvs
Subject: svn commit: r1693168 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml
From: wrowe () apache ! org
Date: 2015-07-28 23:27:35
Message-ID: 20150728232735.4AC79AC00B8 () hades ! apache ! org
[Download RAW message or body]
Author: wrowe
Date: Tue Jul 28 23:27:35 2015
New Revision: 1693168
URL: http://svn.apache.org/r1693168
Log:
Add 2.2 entry for CVE-2015-3183
Modified:
httpd/site/trunk/content/security/vulnerabilities-httpd.xml
Modified: httpd/site/trunk/content/security/vulnerabilities-httpd.xml
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/vulnerabilities-httpd.xml?rev=1693168&r1=1693167&r2=1693168&view=diff
==============================================================================
--- httpd/site/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ httpd/site/trunk/content/security/vulnerabilities-httpd.xml Tue Jul 28 23:27:35 \
2015 @@ -67,6 +67,50 @@ This issue was reported by RÃ ©gis Lero
</acknowledgements>
</issue>
+<issue fixed="2.2.31" reported="20150404" public="20150609" released="20150716">
+<cve name="CVE-2015-3183"/>
+<severity level="4">low</severity>
+<title>HTTP request smuggling attack against chunked request parser</title>
+<description><p>
+
+ An HTTP request smuggling attack was possible due to a bug in parsing of
+ chunked requests. A malicious client could force the server to
+ misinterpret the request length, allowing cache poisoning or
+ credential hijacking if an intermediary proxy is in use.
+
+</p></description>
+<affects prod="httpd" version="2.2.29"/>
+<affects prod="httpd" version="2.2.27"/>
+<affects prod="httpd" version="2.2.26"/>
+<affects prod="httpd" version="2.2.25"/>
+<affects prod="httpd" version="2.2.24"/>
+<affects prod="httpd" version="2.2.23"/>
+<affects prod="httpd" version="2.2.22"/>
+<affects prod="httpd" version="2.2.21"/>
+<affects prod="httpd" version="2.2.20"/>
+<affects prod="httpd" version="2.2.19"/>
+<affects prod="httpd" version="2.2.18"/>
+<affects prod="httpd" version="2.2.17"/>
+<affects prod="httpd" version="2.2.16"/>
+<affects prod="httpd" version="2.2.15"/>
+<affects prod="httpd" version="2.2.14"/>
+<affects prod="httpd" version="2.2.13"/>
+<affects prod="httpd" version="2.2.12"/>
+<affects prod="httpd" version="2.2.11"/>
+<affects prod="httpd" version="2.2.10"/>
+<affects prod="httpd" version="2.2.9"/>
+<affects prod="httpd" version="2.2.8"/>
+<affects prod="httpd" version="2.2.6"/>
+<affects prod="httpd" version="2.2.5"/>
+<affects prod="httpd" version="2.2.4"/>
+<affects prod="httpd" version="2.2.3"/>
+<affects prod="httpd" version="2.2.2"/>
+<affects prod="httpd" version="2.2.0"/>
+<acknowledgements>
+This issue was reported by RÃ ©gis Leroy.
+</acknowledgements>
+</issue>
+
<issue fixed="2.4.16" reported="20130805" public="20150609" released="20150715">
<cve name="CVE-2015-3185"/>
<severity level="4">low</severity>
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic