CVE-2013-5704

Scores

EPSS

0.756medium75.6%
0%20%40%60%80%100%

Percentile: 75.6%

CVSS

4.3medium2.0
0246810

CVSS Score: 4.3/10

All CVSS Scores

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Description

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass “RequestHeader unset” directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states “this is not a security issue in httpd as such.”

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-287

Recommendations

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
For details on how to apply this update, refer to:https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2015:2660

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
For details on how to apply this update, refer to:https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2015:2659

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

URL: http://rhn.redhat.com/errata/RHSA-2016-0061.html

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

URL: http://rhn.redhat.com/errata/RHSA-2015-1249.html

Vulnerable Software (47)

Type: Configuration

Product: apache-commons-collections-eap6

Operating System: rhel

Trait:
{  "fixed": "3.2.1-18.redhat_7.1.ep6.el7"}

Source: redhat

Type: Configuration

Product: apache-commons-collections-eap6

Operating System: rhel

Trait:
{  "fixed": "3.2.1-18.redhat_7.1.ep6.el6"}

Source: redhat

Type: Configuration

Product: apache2

Operating System: debian

Trait:
{  "fixed": "2.4.10-2"}

Source: debian

Type: Configuration

Product: apache2

Operating System: ubuntu utopic 14.10

Trait:
{  "fixed": "2.4.10-1ubuntu1.1"}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu trusty 14.04

Trait:
{  "fixed": "2.4.7-1ubuntu4.4"}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: debian wheezy 7

Trait:
{  "fixed": "2.2.22-13+deb7u4"}

Source: debian

Type: Configuration

Product: httpd

Operating System: rhel

Trait:
{  "fixed": "2.2.26-41.ep6.el6"}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 6

Trait:
{  "fixed": "2.2.15-45.el6"}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 7

Trait:
{  "fixed": "2.4.6-31.el7"}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel

Trait:
{  "fixed": "2.2.26-41.ep6.el5"}

Source: redhat