vulnerability
Zimbra Collaboration: CVE-2023-38709: The Apache package has been upgraded to version 2.4.62 to fix multiple vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | 04/04/2024 | 01/20/2025 | 03/18/2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
04/04/2024
Added
01/20/2025
Modified
03/18/2025
Description
Faulty input validation in the core of apache allows malicious or exploitable backend/content generators to split http responses. this issue affects apache http server: through 2.4.58.
Solution
zimbra-collaboration-upgrade-latest
References
- CVE-2023-38709
- https://attackerkb.com/topics/CVE-2023-38709
- URL-https://httpd.apache.org/security/vulnerabilities_24.html
- URL-https://security.netapp.com/advisory/ntap-20240415-0013/
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/
- URL-http://www.openwall.com/lists/oss-security/2024/04/04/3
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/
- URL-https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html
- URL-https://support.apple.com/kb/HT214119
- URL-http://seclists.org/fulldisclosure/2024/Jul/18

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.