ALAS-2015-579

Related Vulnerabilities: CVE-2015-0228   CVE-2015-0253   CVE-2015-3183   CVE-2015-3185  

It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185) Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3183) A NULL pointer dereference flaw was found in the way httpd generated certain error responses. A remote attacker could possibly use this flaw crash the httpd child process using a request that triggers a certain HTTP error. (CVE-2015-0253) A denial of service flaw was found in the way the mod_lua httpd module processed certain WebSocket Ping requests. A remote attacker could send a specially crafted WebSocket Ping packet that would cause the httpd child process to crash. (CVE-2015-0228)

ALAS-2015-579


Amazon Linux AMI Security Advisory: ALAS-2015-579
Advisory Release Date: 2015-08-17 12:27 Pacific
Advisory Updated Date: 2015-08-17 12:27 Pacific
Severity: Medium

Issue Overview:

It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185)

Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3183)

A NULL pointer dereference flaw was found in the way httpd generated certain error responses. A remote attacker could possibly use this flaw crash the httpd child process using a request that triggers a certain HTTP error. (CVE-2015-0253)

A denial of service flaw was found in the way the mod_lua httpd module processed certain WebSocket Ping requests. A remote attacker could send a specially crafted WebSocket Ping packet that would cause the httpd child process to crash. (CVE-2015-0228)


Affected Packages:

httpd24


Issue Correction:
Run yum update httpd24 to update your system.

New Packages:
i686:
    mod24_ldap-2.4.16-1.62.amzn1.i686
    mod24_session-2.4.16-1.62.amzn1.i686
    mod24_ssl-2.4.16-1.62.amzn1.i686
    httpd24-devel-2.4.16-1.62.amzn1.i686
    mod24_proxy_html-2.4.16-1.62.amzn1.i686
    httpd24-tools-2.4.16-1.62.amzn1.i686
    httpd24-2.4.16-1.62.amzn1.i686
    httpd24-debuginfo-2.4.16-1.62.amzn1.i686

noarch:
    httpd24-manual-2.4.16-1.62.amzn1.noarch

src:
    httpd24-2.4.16-1.62.amzn1.src

x86_64:
    httpd24-devel-2.4.16-1.62.amzn1.x86_64
    httpd24-tools-2.4.16-1.62.amzn1.x86_64
    mod24_ldap-2.4.16-1.62.amzn1.x86_64
    mod24_proxy_html-2.4.16-1.62.amzn1.x86_64
    httpd24-2.4.16-1.62.amzn1.x86_64
    mod24_session-2.4.16-1.62.amzn1.x86_64
    mod24_ssl-2.4.16-1.62.amzn1.x86_64
    httpd24-debuginfo-2.4.16-1.62.amzn1.x86_64