FreeBSD : apache24 -- multiple vulnerabilities (a12494c1-2af4-11e5-86ff-14dae9d210b8)

medium Nessus Plugin ID 84781


The remote FreeBSD host is missing a security-related update.


Jim Jagielski reports :

CVE-2015-3183 ( core: Fix chunk header parsing defect.
Remove apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN filter, parse chunks in a single pass with zero copy. Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext authorized characters.

CVE-2015-3185 ( Replacement of ap_some_auth_required (unusable in Apache httpd 2.4) with new ap_some_authn_required and ap_force_authn hook.

CVE-2015-0253 ( core: Fix a crash with ErrorDocument 400 pointing to a local URL-path with the INCLUDES filter active, introduced in 2.4.11. PR 57531.

CVE-2015-0228 ( mod_lua: A maliciously crafted websockets PING after a script calls r:wsupgrade() can cause a child process crash.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 84781

File Name: freebsd_pkg_a12494c12af411e586ff14dae9d210b8.nasl

Version: 2.6

Type: local

Published: 7/16/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 4.4


Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apache24, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/15/2015

Vulnerability Publication Date: 2/4/2015

Reference Information

CVE: CVE-2015-0228, CVE-2015-0253, CVE-2015-3183, CVE-2015-3185