CVE-2013-5704

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."

References

http://martin.swende.se/blog/HTTPChunked.html

http://marc.info/?l=apache-httpd-dev&m=139636309822854&w=2

http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1610674&r2=1610814&diff_format=h

http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c

http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

http://www.ubuntu.com/usn/USN-2523-1

http://rhn.redhat.com/errata/RHSA-2015-0325.html

https://support.apple.com/HT204659

http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html

http://www.securityfocus.com/bid/66550

http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

https://support.apple.com/HT205219

http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html

http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

http://marc.info/?l=bugtraq&m=144493176821532&w=2

http://marc.info/?l=bugtraq&m=143403519711434&w=2

http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html

http://rhn.redhat.com/errata/RHSA-2016-0062.html

http://rhn.redhat.com/errata/RHSA-2016-0061.html

https://access.redhat.com/errata/RHSA-2015:2660

http://rhn.redhat.com/errata/RHSA-2015-2661.html

https://access.redhat.com/errata/RHSA-2015:2659

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246

https://security.gentoo.org/glsa/201504-03

http://rhn.redhat.com/errata/RHSA-2015-1249.html

https://httpd.apache.org/security/vulnerabilities_24.html

http://www.mandriva.com/security/advisories?name=MDVSA-2014:174

http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

Details

Source: MITRE

Published: 2014-04-15

Updated: 2021-06-06

Type: CWE-264

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*

Tenable Plugins

View all (38 total)

IDNameProductFamilySeverity
144289IBM HTTP Server 8.5.0.0 <= 8.5.5.2 / 8.0.0.0 <= 8.0.0.9 / 7.0.0.0 <= 7.0.0.33 / 6.1.0.0. <= 6.1.0.47 / 6.0.2.0 <= 6.0.2.43 Multiple Vulnerabilities (509275)NessusWeb Servers
high
124922EulerOS Virtualization 3.0.1.0 : httpd (EulerOS-SA-2019-1419)NessusHuawei Local Security Checks
critical
700510Mac OS X 10.10.x < 10.10.3 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
critical
98907Apache 2.4.x < 2.4.12 Multiple VulnerabilitiesWeb Application ScanningComponent Vulnerability
high
91367F5 Networks BIG-IP : Apache vulnerability (K16863)NessusF5 Networks Local Security Checks
medium
88077RHEL 5 / 6 / 7 : JBoss Web Server (RHSA-2016:0061)NessusRed Hat Local Security Checks
medium
87458RHEL 7 : JBoss Web Server (RHSA-2015:2660)NessusRed Hat Local Security Checks
medium
87457RHEL 6 : JBoss Web Server (RHSA-2015:2659)NessusRed Hat Local Security Checks
medium
86066Mac OS X : OS X Server < 5.0.3 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
85196Scientific Linux Security Update : httpd on SL6.x i386/x86_64 (20150722)NessusScientific Linux Local Security Checks
medium
85008CentOS 6 : httpd (CESA-2015:1249)NessusCentOS Local Security Checks
medium
84911RHEL 6 : httpd (RHSA-2015:1249)NessusRed Hat Local Security Checks
medium
83945SUSE SLES12 Security Update : apache2 (SUSE-SU-2015:0974-1)NessusSuSE Local Security Checks
medium
82916Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : httpd (SSA:2015-111-03)NessusSlackware Local Security Checks
medium
82733GLSA-201504-03 : Apache: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
82700Mac OS X Multiple Vulnerabilities (Security Update 2015-004) (FREAK)NessusMacOS X Local Security Checks
critical
82699Mac OS X 10.10.x < 10.10.3 Multiple Vulnerabilities (FREAK)NessusMacOS X Local Security Checks
critical
82657SuSE 11.3 Security Update : apache2 (SAT Patch Number 10533)NessusSuSE Local Security Checks
medium
82252Scientific Linux Security Update : httpd on SL7.x x86_64 (20150305)NessusScientific Linux Local Security Checks
medium
82216Debian DLA-71-1 : apache2 security updateNessusDebian Local Security Checks
medium
81888CentOS 7 : httpd (CESA-2015:0325)NessusCentOS Local Security Checks
medium
81837Fedora 21 : httpd-2.4.10-15.fc21 (2014-17195)NessusFedora Local Security Checks
medium
81802Oracle Linux 7 : httpd (ELSA-2015-0325)NessusOracle Linux Local Security Checks
medium
81755Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS / 14.10 : apache2 vulnerabilities (USN-2523-1)NessusUbuntu Local Security Checks
medium
81629RHEL 7 : httpd (RHSA-2015:0325)NessusRed Hat Local Security Checks
medium
81581Fedora 20 : httpd-2.4.10-2.fc20 (2014-17153)NessusFedora Local Security Checks
medium
81401IBM WebSphere Application Server 8.0 < Fix Pack 10 Multiple Vulnerabilities (POODLE)NessusWeb Servers
medium
81329Amazon Linux AMI : httpd24 (ALAS-2015-483)NessusAmazon Linux Local Security Checks
medium
81126Apache 2.4.x < 2.4.12 Multiple VulnerabilitiesNessusWeb Servers
medium
81116FreeBSD : apache24 -- several vulnerabilities (5804b9d4-a959-11e4-9363-20cf30e32f6d)NessusFreeBSD Local Security Checks
medium
81002Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (January 2015 CPU)NessusWeb Servers
high
80398IBM WebSphere Application Server 8.5 < Fix Pack 8.5.5.4 Multiple Vulnerabilities (POODLE)NessusWeb Servers
medium
80300openSUSE Security Update : apache2 (openSUSE-SU-2014:1726-1)NessusSuSE Local Security Checks
medium
78604IBM WebSphere Application Server 7.0 < Fix Pack 35 Multiple VulnerabilitiesNessusWeb Servers
medium
78357Amazon Linux AMI : httpd (ALAS-2014-414)NessusAmazon Linux Local Security Checks
medium
77653Mandriva Linux Security Advisory : apache (MDVSA-2014:174)NessusMandriva Local Security Checks
medium
77531Apache 2.2.x < 2.2.28 Multiple VulnerabilitiesNessusWeb Servers
high
76780FreeBSD : apache22 -- several vulnerabilities (f927e06c-1109-11e4-b090-20cf30e32f6d)NessusFreeBSD Local Security Checks
medium