The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "apache2", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-bin", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-bin-dbgsym", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-data", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-dbg", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-dev", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-doc", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-mpm-event", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-mpm-itk", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-mpm-prefork", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-mpm-worker", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-suexec", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-suexec-custom", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-suexec-custom-dbgsym", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-suexec-pristine", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-suexec-pristine-dbgsym", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-utils", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2-utils-dbgsym", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "apache2.2-bin", "binary_version": "2.4.7-1ubuntu4.5" }, { "binary_name": "libapache2-mod-macro", "binary_version": "1:2.4.7-1ubuntu4.5" }, { "binary_name": "libapache2-mod-proxy-html", "binary_version": "1:2.4.7-1ubuntu4.5" } ] }