The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "apache2-suexec": "2.4.7-1ubuntu4.5", "apache2-suexec-pristine-dbgsym": "2.4.7-1ubuntu4.5", "libapache2-mod-proxy-html": "1:2.4.7-1ubuntu4.5", "apache2-dev": "2.4.7-1ubuntu4.5", "apache2-bin": "2.4.7-1ubuntu4.5", "apache2-suexec-custom": "2.4.7-1ubuntu4.5", "apache2-suexec-pristine": "2.4.7-1ubuntu4.5", "apache2-doc": "2.4.7-1ubuntu4.5", "apache2-mpm-event": "2.4.7-1ubuntu4.5", "apache2": "2.4.7-1ubuntu4.5", "apache2-dbg": "2.4.7-1ubuntu4.5", "apache2-utils-dbgsym": "2.4.7-1ubuntu4.5", "apache2-data": "2.4.7-1ubuntu4.5", "apache2-mpm-prefork": "2.4.7-1ubuntu4.5", "apache2-mpm-itk": "2.4.7-1ubuntu4.5", "libapache2-mod-macro": "1:2.4.7-1ubuntu4.5", "apache2-suexec-custom-dbgsym": "2.4.7-1ubuntu4.5", "apache2.2-bin": "2.4.7-1ubuntu4.5", "apache2-bin-dbgsym": "2.4.7-1ubuntu4.5", "apache2-utils": "2.4.7-1ubuntu4.5", "apache2-mpm-worker": "2.4.7-1ubuntu4.5" } ] }