Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-862D6AB3-C75E-11E6-9F98-20CF30E32F6D (CVE-2016-8743): Apache httpd -- several vulnerabilities

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

FreeBSD: VID-862D6AB3-C75E-11E6-9F98-20CF30E32F6D (CVE-2016-8743): Apache httpd -- several vulnerabilities

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
12/20/2016
Created
07/25/2018
Added
12/21/2016
Modified
05/03/2019

Description

Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.

Solution(s)

  • freebsd-upgrade-package-apache24

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;