Executive Summary

Informations
Name CVE-2013-5704 First vendor Publication 2014-04-15
Vendor Cve Last vendor Modification 2017-01-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28989
 
Oval ID: oval:org.mitre.oval:def:28989
Title: HP-UX Apache Server Suite running Apache Tomcat or PHP, Remote Denial of Service (DoS) and Other Vulnerabilities
Description: The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."
Family: unix Class: vulnerability
Reference(s): CVE-2013-5704
Version: 4
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Nessus® Vulnerability Scanner

Date Description
2016-05-31 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL16863.nasl - Type : ACT_GATHER_INFO
2016-01-22 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2016-0061.nasl - Type : ACT_GATHER_INFO
2015-12-17 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-2660.nasl - Type : ACT_GATHER_INFO
2015-12-17 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-2659.nasl - Type : ACT_GATHER_INFO
2015-09-22 Name : The remote host is missing a security update for OS X Server.
File : macosx_server_5_0_3.nasl - Type : ACT_GATHER_INFO
2015-08-04 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20150722_httpd_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2015-07-28 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2015-1249.nasl - Type : ACT_GATHER_INFO
2015-07-22 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-1249.nasl - Type : ACT_GATHER_INFO
2015-06-02 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-0974-1.nasl - Type : ACT_GATHER_INFO
2015-04-22 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2015-111-03.nasl - Type : ACT_GATHER_INFO
2015-04-13 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201504-03.nasl - Type : ACT_GATHER_INFO
2015-04-10 Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_SecUpd2015-004.nasl - Type : ACT_GATHER_INFO
2015-04-10 Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_10_10_3.nasl - Type : ACT_GATHER_INFO
2015-04-09 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_apache2-150325.nasl - Type : ACT_GATHER_INFO
2015-03-30 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-093.nasl - Type : ACT_GATHER_INFO
2015-03-26 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20150305_httpd_on_SL7_x.nasl - Type : ACT_GATHER_INFO
2015-03-26 Name : The remote Debian host is missing a security update.
File : debian_DLA-71.nasl - Type : ACT_GATHER_INFO
2015-03-18 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2015-0325.nasl - Type : ACT_GATHER_INFO
2015-03-17 Name : The remote Fedora host is missing a security update.
File : fedora_2014-17195.nasl - Type : ACT_GATHER_INFO
2015-03-13 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2015-0325.nasl - Type : ACT_GATHER_INFO
2015-03-11 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2523-1.nasl - Type : ACT_GATHER_INFO
2015-03-05 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-0325.nasl - Type : ACT_GATHER_INFO
2015-03-02 Name : The remote Fedora host is missing a security update.
File : fedora_2014-17153.nasl - Type : ACT_GATHER_INFO
2015-02-18 Name : The remote application server is affected by multiple vulnerabilities.
File : websphere_8_0_0_10.nasl - Type : ACT_GATHER_INFO
2015-02-13 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2015-483.nasl - Type : ACT_GATHER_INFO
2015-02-02 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_5804b9d4a95911e4936320cf30e32f6d.nasl - Type : ACT_GATHER_INFO
2015-02-02 Name : The remote web server is affected by multiple vulnerabilities.
File : apache_2_4_12.nasl - Type : ACT_GATHER_INFO
2015-01-27 Name : The remote web server is affected by multiple vulnerabilities.
File : oracle_http_server_cpu_jan_2015.nasl - Type : ACT_GATHER_INFO
2015-01-07 Name : The remote application server is affected by multiple vulnerabilities.
File : websphere_8_5_5_4.nasl - Type : ACT_GATHER_INFO
2014-12-30 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-822.nasl - Type : ACT_GATHER_INFO
2014-10-21 Name : The remote application server is affected by multiple vulnerabilities.
File : websphere_7_0_0_35.nasl - Type : ACT_GATHER_INFO
2014-10-12 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-414.nasl - Type : ACT_GATHER_INFO
2014-09-12 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-174.nasl - Type : ACT_GATHER_INFO
2014-09-04 Name : The remote web server is affected by multiple vulnerabilities.
File : apache_2_2_29.nasl - Type : ACT_GATHER_INFO
2014-07-25 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_f927e06c110911e4b09020cf30e32f6d.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
APPLE http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
BID http://www.securityfocus.com/bid/66550
CONFIRM http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c...
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-286720...
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://httpd.apache.org/security/vulnerabilities_24.html
https://support.apple.com/HT204659
https://support.apple.com/HT205219
GENTOO https://security.gentoo.org/glsa/201504-03
HP http://marc.info/?l=bugtraq&m=143403519711434&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2014:174
MISC http://martin.swende.se/blog/HTTPChunked.html
MLIST http://marc.info/?l=apache-httpd-dev&m=139636309822854&w=2
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e8029...
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277...
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5...
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360...
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86...
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b957...
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326...
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806ce...
REDHAT http://rhn.redhat.com/errata/RHSA-2015-0325.html
http://rhn.redhat.com/errata/RHSA-2015-1249.html
http://rhn.redhat.com/errata/RHSA-2015-2661.html
http://rhn.redhat.com/errata/RHSA-2016-0061.html
http://rhn.redhat.com/errata/RHSA-2016-0062.html
https://access.redhat.com/errata/RHSA-2015:2659
https://access.redhat.com/errata/RHSA-2015:2660
UBUNTU http://www.ubuntu.com/usn/USN-2523-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
Date Informations
2020-05-23 00:38:25
  • Multiple Updates
2019-08-16 12:02:13
  • Multiple Updates
2019-03-19 12:05:56
  • Multiple Updates
2017-01-07 09:25:13
  • Multiple Updates
2016-12-24 09:24:00
  • Multiple Updates
2016-12-22 09:23:34
  • Multiple Updates
2016-12-08 09:23:28
  • Multiple Updates
2016-12-07 09:24:11
  • Multiple Updates
2016-12-06 09:23:54
  • Multiple Updates
2016-10-26 09:22:41
  • Multiple Updates
2016-10-12 09:24:04
  • Multiple Updates
2016-08-23 09:24:48
  • Multiple Updates
2016-06-17 09:27:05
  • Multiple Updates
2016-06-01 13:28:02
  • Multiple Updates
2016-01-23 13:25:19
  • Multiple Updates
2016-01-22 09:22:15
  • Multiple Updates
2015-12-18 13:27:31
  • Multiple Updates
2015-09-23 13:24:06
  • Multiple Updates
2015-09-19 09:22:05
  • Multiple Updates
2015-08-12 13:32:53
  • Multiple Updates
2015-07-31 13:28:36
  • Multiple Updates
2015-07-24 13:29:03
  • Multiple Updates
2015-07-17 09:19:16
  • Multiple Updates
2015-06-03 13:30:06
  • Multiple Updates
2015-05-14 09:26:02
  • Multiple Updates
2015-04-23 13:30:27
  • Multiple Updates
2015-04-21 13:28:05
  • Multiple Updates
2015-04-15 09:27:30
  • Multiple Updates
2015-04-14 09:27:04
  • Multiple Updates
2015-04-11 13:28:37
  • Multiple Updates
2015-04-10 13:28:05
  • Multiple Updates
2015-03-31 13:28:02
  • Multiple Updates
2015-03-27 13:27:57
  • Multiple Updates
2015-03-19 13:28:03
  • Multiple Updates
2015-03-18 13:27:18
  • Multiple Updates
2015-03-18 09:26:13
  • Multiple Updates
2015-03-17 09:25:45
  • Multiple Updates
2015-03-14 13:25:20
  • Multiple Updates
2015-03-12 13:24:08
  • Multiple Updates
2015-03-06 13:25:43
  • Multiple Updates
2015-03-03 13:25:14
  • Multiple Updates
2015-02-19 13:24:43
  • Multiple Updates
2015-02-14 13:23:45
  • Multiple Updates
2015-02-03 13:24:10
  • Multiple Updates
2015-01-28 13:23:54
  • Multiple Updates
2015-01-22 17:22:45
  • Multiple Updates
2015-01-08 13:27:56
  • Multiple Updates
2014-12-31 13:26:12
  • Multiple Updates
2014-10-22 13:25:40
  • Multiple Updates
2014-10-12 13:27:03
  • Multiple Updates
2014-09-13 13:43:02
  • Multiple Updates
2014-09-05 13:24:17
  • Multiple Updates
2014-07-24 09:22:30
  • Multiple Updates
2014-04-16 13:23:55
  • Multiple Updates
2014-04-15 17:20:27
  • First insertion