CVE-2015-3185
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
Known Affected Software
18 configuration(s) from 3 vendor(s)
http_server
Version:
2.4.13
CPE:
cpe:2.3:a:apache:http_server:2.4.13:*:*:*:*:*:*:*
http_server
Version:
2.4.4
CPE:
cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
http_server
Version:
2.4.8
CPE:
cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*
http_server
Version:
2.4.12
CPE:
cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*
http_server
Version:
2.4.9
CPE:
cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
http_server
Version:
2.4.0
CPE:
cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
http_server
Version:
2.4.10
CPE:
cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
http_server
Version:
2.4.7
CPE:
cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
http_server
Version:
2.4.2
CPE:
cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
http_server
Version:
2.4.6
CPE:
cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
http_server
Version:
2.4.1
CPE:
cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
http_server
Version:
2.4.3
CPE:
cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
mac_os_x
Version:
10.10.4
CPE:
cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
mac_os_x_server
Version:
5.0.3
CPE:
cpe:2.3:o:apple:mac_os_x_server:5.0.3:*:*:*:*:*:*:*
xcode
Version:
7.0
CPE:
cpe:2.3:a:apple:xcode:7.0:*:*:*:*:*:*:*
ubuntu_linux
Version:
14.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
ubuntu_linux
Version:
12.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
ubuntu_linux
Version:
15.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
This vulnerability affects 18 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://httpd.apache.org/security/vulnerabilities_24.htmlsecalert@redhat.com Vendor Advisory
-
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.htmlsecalert@redhat.com
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlsecalert@redhat.com
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.htmlsecalert@redhat.com
-
http://rhn.redhat.com/errata/RHSA-2015-1666.htmlsecalert@redhat.com
-
http://rhn.redhat.com/errata/RHSA-2015-1667.htmlsecalert@redhat.com
-
http://rhn.redhat.com/errata/RHSA-2016-2957.htmlsecalert@redhat.com
-
http://www.apache.org/dist/httpd/CHANGES_2.4secalert@redhat.com
-
http://www.debian.org/security/2015/dsa-3325secalert@redhat.com
-
http://www.securityfocus.com/bid/75965secalert@redhat.com
-
http://www.securitytracker.com/id/1032967secalert@redhat.com
-
http://www.ubuntu.com/usn/USN-2686-1secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2017:2708secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2017:2709secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2017:2710secalert@redhat.com
-
https://github.com/apache/httpd/commit/cd2b7a26c776b0754fb98426a67804fd48118708secalert@redhat.com
-
https://github.com/apache/httpd/commit/db81019ab88734ed35fa70294a0cfa7a19743f73secalert@redhat.com
-
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Esecalert@redhat.com
-
https://support.apple.com/HT205217secalert@redhat.com
-
https://support.apple.com/HT205219secalert@redhat.com
-
https://support.apple.com/kb/HT205031secalert@redhat.com
-
http://httpd.apache.org/security/vulnerabilities_24.htmlaf854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://rhn.redhat.com/errata/RHSA-2015-1666.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://rhn.redhat.com/errata/RHSA-2015-1667.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://rhn.redhat.com/errata/RHSA-2016-2957.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.apache.org/dist/httpd/CHANGES_2.4af854a3a-2127-422b-91ae-364da2661108
-
http://www.debian.org/security/2015/dsa-3325af854a3a-2127-422b-91ae-364da2661108
-
http://www.securityfocus.com/bid/75965af854a3a-2127-422b-91ae-364da2661108
-
http://www.securitytracker.com/id/1032967af854a3a-2127-422b-91ae-364da2661108
-
http://www.ubuntu.com/usn/USN-2686-1af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:2708af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:2709af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:2710af854a3a-2127-422b-91ae-364da2661108
-
https://github.com/apache/httpd/commit/cd2b7a26c776b0754fb98426a67804fd48118708af854a3a-2127-422b-91ae-364da2661108
-
https://github.com/apache/httpd/commit/db81019ab88734ed35fa70294a0cfa7a19743f73af854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://support.apple.com/HT205217af854a3a-2127-422b-91ae-364da2661108
-
https://support.apple.com/HT205219af854a3a-2127-422b-91ae-364da2661108
-
https://support.apple.com/kb/HT205031af854a3a-2127-422b-91ae-364da2661108
Severity Details
out of 10.0
Low
Key Information
- Published Date
- July 20, 2015
