Search for vulnerabilities
Vulnerability details: VCID-1pf4-rzru-aaak
Vulnerability ID VCID-1pf4-rzru-aaak
Aliases CVE-2015-3183
Summary The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual Medium http://httpd.apache.org/security/vulnerabilities_24.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3183.html
rhas Moderate https://access.redhat.com/errata/RHSA-2015:1666
rhas Moderate https://access.redhat.com/errata/RHSA-2015:1667
rhas Moderate https://access.redhat.com/errata/RHSA-2015:1668
generic_textual HIGH https://access.redhat.com/errata/RHSA-2015:2659
generic_textual HIGH https://access.redhat.com/errata/RHSA-2015:2660
rhas Moderate https://access.redhat.com/errata/RHSA-2015:2661
rhas Moderate https://access.redhat.com/errata/RHSA-2016:0061
rhas Moderate https://access.redhat.com/errata/RHSA-2016:0062
rhas Moderate https://access.redhat.com/errata/RHSA-2016:2054
rhas Moderate https://access.redhat.com/errata/RHSA-2016:2055
rhas Important https://access.redhat.com/errata/RHSA-2016:2056
cvssv3 3.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3183.json
epss 0.06162 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06162 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06162 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06162 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06162 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06162 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06162 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06162 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06162 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06162 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06162 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06520 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06520 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06520 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.06520 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.23821 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.23821 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.23821 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.23821 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.23821 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.37363 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.38439 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.38439 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.38439 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.38439 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.38439 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.38439 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.38439 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.38439 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.38439 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
epss 0.50417 https://api.first.org/data/v1/epss?cve=CVE-2015-3183
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1243887
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
apache_httpd low https://httpd.apache.org/security/json/CVE-2015-3183.json
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2015-3183
generic_textual Medium https://ubuntu.com/security/notices/USN-2686-1
generic_textual Medium https://www.apache.org/dist/httpd/Announcement2.4.txt
generic_textual Medium https://www.apache.org/dist/httpd/CHANGES_2.4.16
cvssv3.1 9.8 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
generic_textual CRITICAL http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
Reference id Reference type URL
http://httpd.apache.org/security/vulnerabilities_24.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3183.html
http://rhn.redhat.com/errata/RHSA-2015-1666.html
http://rhn.redhat.com/errata/RHSA-2015-1667.html
http://rhn.redhat.com/errata/RHSA-2015-1668.html
http://rhn.redhat.com/errata/RHSA-2015-2661.html
http://rhn.redhat.com/errata/RHSA-2016-0061.html
http://rhn.redhat.com/errata/RHSA-2016-0062.html
http://rhn.redhat.com/errata/RHSA-2016-2054.html
http://rhn.redhat.com/errata/RHSA-2016-2055.html
http://rhn.redhat.com/errata/RHSA-2016-2056.html
https://access.redhat.com/errata/RHSA-2015:2659
https://access.redhat.com/errata/RHSA-2015:2660
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3183.json
https://api.first.org/data/v1/epss?cve=CVE-2015-3183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
https://github.com/apache/httpd/commit/a6027e56924bb6227c1fdbf6f91e7e2438338be6
https://github.com/apache/httpd/commit/e427c41257957b57036d5a549b260b6185d1dd73
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
https://puppet.com/security/cve/CVE-2015-3183
https://security.gentoo.org/glsa/201610-02
https://support.apple.com/HT205219
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2686-1
https://www.apache.org/dist/httpd/Announcement2.4.txt
https://www.apache.org/dist/httpd/CHANGES_2.4.16
http://www.apache.org/dist/httpd/CHANGES_2.4
http://www.debian.org/security/2015/dsa-3325
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
http://www.securityfocus.com/bid/75963
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032967
http://www.ubuntu.com/usn/USN-2686-1
1243887 https://bugzilla.redhat.com/show_bug.cgi?id=1243887
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
CVE-2015-3183 https://httpd.apache.org/security/json/CVE-2015-3183.json
CVE-2015-3183 https://nvd.nist.gov/vuln/detail/CVE-2015-3183
RHSA-2015:1666 https://access.redhat.com/errata/RHSA-2015:1666
RHSA-2015:1667 https://access.redhat.com/errata/RHSA-2015:1667
RHSA-2015:1668 https://access.redhat.com/errata/RHSA-2015:1668
RHSA-2015:2661 https://access.redhat.com/errata/RHSA-2015:2661
RHSA-2016:0061 https://access.redhat.com/errata/RHSA-2016:0061
RHSA-2016:0062 https://access.redhat.com/errata/RHSA-2016:0062
RHSA-2016:2054 https://access.redhat.com/errata/RHSA-2016:2054
RHSA-2016:2055 https://access.redhat.com/errata/RHSA-2016:2055
RHSA-2016:2056 https://access.redhat.com/errata/RHSA-2016:2056
USN-2686-1 https://usn.ubuntu.com/2686-1/
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3183.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2015-3183
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.93761
EPSS Score 0.06162
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.