CVE Vulnerabilities

CVE-2016-8743

Published: Jul 27, 2017 | Modified: Nov 07, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V3
4 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
Ubuntu
MEDIUM

Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.

Affected Software

Name Vendor Start Version End Version
Http_server Apache 2.2.0 (including) 2.2.31 (including)
Http_server Apache 2.4.1 (including) 2.4.23 (including)
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7 *
Red Hat Enterprise Linux 6 RedHat httpd-0:2.2.15-60.el6_9.4 *
Red Hat Enterprise Linux 7 RedHat httpd-0:2.4.6-45.el7_3.4 *
Red Hat JBoss Core Services 1 RedHat *
Red Hat Software Collections for Red Hat Enterprise Linux 6 RedHat httpd24-httpd-0:2.4.25-9.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS RedHat httpd24-httpd-0:2.4.25-9.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat httpd24-httpd-0:2.4.25-9.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS RedHat httpd24-httpd-0:2.4.25-9.el7 *
Apache2 Ubuntu precise *
Apache2 Ubuntu trusty *
Apache2 Ubuntu upstream *
Apache2 Ubuntu xenial *
Apache2 Ubuntu yakkety *

References