FreeBSD : apache24 -- multiple vulnerabilities (a12494c1-2af4-11e5-86ff-14dae9d210b8)

Medium Nessus Plugin ID 84781


The remote FreeBSD host is missing a security-related update.


Jim Jagielski reports :

CVE-2015-3183 ( core: Fix chunk header parsing defect.
Remove apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN filter, parse chunks in a single pass with zero copy. Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext authorized characters.

CVE-2015-3185 ( Replacement of ap_some_auth_required (unusable in Apache httpd 2.4) with new ap_some_authn_required and ap_force_authn hook.

CVE-2015-0253 ( core: Fix a crash with ErrorDocument 400 pointing to a local URL-path with the INCLUDES filter active, introduced in 2.4.11. PR 57531.

CVE-2015-0228 ( mod_lua: A maliciously crafted websockets PING after a script calls r:wsupgrade() can cause a child process crash.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 84781

File Name: freebsd_pkg_a12494c12af411e586ff14dae9d210b8.nasl

Version: $Revision: 2.3 $

Type: local

Published: 2015/07/16

Modified: 2016/07/18

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apache24, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2015/07/15

Vulnerability Publication Date: 2015/02/04

Reference Information

CVE: CVE-2015-0228, CVE-2015-0253, CVE-2015-3183, CVE-2015-3185