- Home
- CVEs with nessus.description==The Tenable SecurityCenter application installed on the remote host
contains a bundled version of Apache HTTP Server prior to 2.4.16. It
is, therefore, affected by the following vulnerabilities :
- A flaw exists in the chunked transfer coding
implementation in http_filters.c. due to a failure to
properly parse chunk headers when handling large
chunk-size values and invalid chunk-extension
characters. A remote attacker can exploit this, via a
crafted request, to carry out HTTP request smuggling,
potentially resulting in cache poisoning or the
hijacking of credentials. (CVE-2015-3183)
- A security bypass vulnerability exists due to a failure
in the ap_some_auth_required() function in request.c to
consider that a Require directive may be associated with
an authorization setting instead of an authentication
setting. A remote attacker can exploit this, by
leveraging the presence of a module that relies on the
2.2 API behavior, to bypass intended access restrictions
under certain circumstances.
(CVE-2015-3185)
Note that the 4.x version of SecurityCenter is impacted only by
CVE-2015-3183. The 5.x version is impacted by both CVE-2015-3183 and
CVE-2015-3185
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top