{"id":"USN-2523-1","summary":"apache2 vulnerabilities","details":"Martin Holst Swende discovered that the mod_headers module allowed HTTP\ntrailers to replace HTTP headers during request processing. A remote\nattacker could possibly use this issue to bypass RequestHeaders directives.\n(CVE-2013-5704)\n\nMark Montague discovered that the mod_cache module incorrectly handled\nempty HTTP Content-Type headers. A remote attacker could use this issue to\ncause the server to stop responding, leading to a denial of service. This\nissue only affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2014-3581)\n\nTeguh P. Alko discovered that the mod_proxy_fcgi module incorrectly\nhandled long response headers. A remote attacker could use this issue to\ncause the server to stop responding, leading to a denial of service. This\nissue only affected Ubuntu 14.10. (CVE-2014-3583)\n\nIt was discovered that the mod_lua module incorrectly handled different\narguments within different contexts. A remote attacker could possibly use\nthis issue to bypass intended access restrictions. This issue only affected\nUbuntu 14.10. (CVE-2014-8109)\n\nGuido Vranken discovered that the mod_lua module incorrectly handled a\nspecially crafted websocket PING in certain circumstances. A remote\nattacker could possibly use this issue to cause the server to stop\nresponding, leading to a denial of service. This issue only affected\nUbuntu 14.10. (CVE-2015-0228)\n","modified":"2026-02-10T04:40:53Z","published":"2015-03-10T14:49:16Z","related":["UBUNTU-CVE-2013-5704","UBUNTU-CVE-2014-3581"],"upstream":["CVE-2013-5704","CVE-2014-3581","CVE-2014-3583","UBUNTU-CVE-2013-5704","UBUNTU-CVE-2014-3581","UBUNTU-CVE-2014-3583","UBUNTU-CVE-2014-8109","UBUNTU-CVE-2015-0228"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2523-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-5704"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-3581"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-3583"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-8109"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-0228"}],"affected":[{"package":{"name":"apache2","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/apache2@2.4.7-1ubuntu4.4?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.7-1ubuntu4.4"}]}],"versions":["2.4.6-2ubuntu2","2.4.6-2ubuntu3","2.4.6-2ubuntu4","2.4.7-1ubuntu1","2.4.7-1ubuntu2","2.4.7-1ubuntu3","2.4.7-1ubuntu4","2.4.7-1ubuntu4.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"apache2","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2-bin","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2-data","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2-dev","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2-mpm-event","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2-mpm-itk","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2-mpm-prefork","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2-mpm-worker","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2-suexec","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2-suexec-custom","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2-suexec-pristine","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2-utils","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"apache2.2-bin","binary_version":"2.4.7-1ubuntu4.4"},{"binary_name":"libapache2-mod-macro","binary_version":"1:2.4.7-1ubuntu4.4"},{"binary_name":"libapache2-mod-proxy-html","binary_version":"1:2.4.7-1ubuntu4.4"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2523-1.json","cves_map":{"cves":[{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2013-5704"},{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2014-3581"}],"ecosystem":"Ubuntu:14.04:LTS"}}}],"schema_version":"1.7.3"}