First published: Tue Dec 27 2011(Updated: )
An Uncontrolled Resource Consumption vulnerability in multiple products may allow an attacker to cause web service portal denial of service (DoS) via handling special crafted HTTP requests/responses in pieces slowly. Slow HTTP attacks are denial-of-service (DoS) attacks in which the attacker sends HTTP requests in pieces slowly, one at a time to a Web server. If an HTTP request is not complete, or if the transfer rate is very low, the server keeps its resources busy waiting for the rest of the data. When the server’s concurrent connection pool reaches its maximum, this creates a DoS. Slow HTTP attacks are easy to execute because they require only minimal resources from the attacker.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | =2.0.42 | |
Apache Http Server | =2.2 | |
Apache Http Server | =2.0.58 | |
Apache Http Server | =2.2.11 | |
Apache Http Server | =2.2.0 | |
Apache Http Server | =1.3.38 | |
Apache Http Server | =2.2.10 | |
Apache Http Server | =2.2.13 | |
Apache Http Server | =1.3.23 | |
Apache Http Server | =2.0.47 | |
Apache Http Server | =1.3.27 | |
Apache Http Server | =2.1 | |
Apache Http Server | =2.0.56 | |
Apache Http Server | =2.0.50 | |
Apache Http Server | =2.2.2 | |
Apache Http Server | =1.3.10 | |
Apache Http Server | =1.0.5 | |
Apache Http Server | =2.1.3 | |
Apache Http Server | =1.1.1 | |
Apache Http Server | =2.2.4 | |
Apache Http Server | =2.0.35 | |
Apache Http Server | =2.0.37 | |
Apache Http Server | =2.0.55 | |
Apache Http Server | <=2.2.14 | |
Apache Http Server | =1.3.33 | |
Apache Http Server | =1.3.8 | |
Apache Http Server | =2.1.2 | |
Apache Http Server | =2.1.1 | |
Apache Http Server | =1.3.36 | |
Apache Http Server | =2.0.44 | |
Apache Http Server | =1.3.16 | |
Apache Http Server | =1.3.1 | |
Apache Http Server | =1.3.25 | |
Apache Http Server | =1.3.28 | |
Apache Http Server | =1.3.19 | |
Apache Http Server | =2.0.39 | |
Apache Http Server | =1.3.31 | |
Apache Http Server | =1.3.68 | |
Apache Http Server | =1.3.24 | |
Apache Http Server | =1.3.5 | |
Apache Http Server | =2.2.8 | |
Apache Http Server | =2.0.52 | |
Apache Http Server | =1.3.20 | |
Apache Http Server | =1.0.2 | |
Apache Http Server | =2.1.7 | |
Apache Http Server | =2.0.53 | |
Apache Http Server | =1.4.0 | |
Apache Http Server | =2.0.57 | |
Apache Http Server | =1.3.35 | |
Apache Http Server | =2.0.51 | |
Apache Http Server | =1.1 | |
Apache Http Server | =1.3.6 | |
Apache Http Server | =2.0.28-beta | |
Apache Http Server | =1.3.2 | |
Apache Http Server | =2.0.63 | |
Apache Http Server | =1.3.34 | |
Apache Http Server | =2.0.41 | |
Apache Http Server | =2.0.49 | |
Apache Http Server | =1.3.4 | |
Apache Http Server | =2.1.6 | |
Apache Http Server | =1.2.5 | |
Apache Http Server | =2.0.9 | |
Apache Http Server | =1.3.13 | |
Apache Http Server | =1.0 | |
Apache Http Server | =2.0.34-beta | |
Apache Http Server | =1.2.4 | |
Apache Http Server | =1.3.39 | |
Apache Http Server | =1.3.30 | |
Apache Http Server | =1.3.18 | |
Apache Http Server | =2.0.61 | |
Apache Http Server | =2.1.9 | |
Apache Http Server | =2.2.6 | |
Apache Http Server | =2.0.32 | |
Apache Http Server | =1.3.65 | |
Apache Http Server | =1.0.3 | |
Apache Http Server | =2.0.38 | |
Apache Http Server | =1.3.0 | |
Apache Http Server | =2.2.9 | |
Apache Http Server | =1.3 | |
Apache Http Server | =1.3.12 | |
Apache Http Server | =2.1.4 | |
Apache Http Server | =2.0.48 | |
Apache Http Server | =1.3.3 | |
Apache Http Server | =1.3.17 | |
Apache Http Server | =1.3.1.1 | |
Apache Http Server | =2.0.45 | |
Apache Http Server | =1.3.26 | |
Apache Http Server | =1.3.9 | |
Apache Http Server | =2.2.12 | |
Apache Http Server | =2.0.40 | |
Apache Http Server | =2.1.5 | |
Apache Http Server | =2.0.36 | |
Apache Http Server | =1.3.32 | |
Apache Http Server | =1.3.15 | |
Apache Http Server | =1.3.14 | |
Apache Http Server | =1.3.42 | |
Apache Http Server | =1.3.29 | |
Apache Http Server | =1.99 | |
Apache Http Server | =2.2.3 | |
Apache Http Server | =2.0.46 | |
Apache Http Server | =1.3.22 | |
Apache Http Server | =1.3.37 | |
Apache Http Server | =1.3.11 | |
Apache Http Server | =1.2.6 | |
Apache Http Server | =2.0.54 | |
Apache Http Server | =2.0.43 | |
Apache Http Server | =2.0.59 | |
Apache Http Server | =2.1.8 | |
Apache Http Server | =1.2 | |
Apache Http Server | =1.2.9 | |
Apache Http Server | =1.3.7 | |
Apache Http Server | =2.0.28 | |
Apache Http Server | =2.0 | |
Apache Http Server | =1.3.41 | |
Apache Http Server | =2.0.32-beta | |
Apache Http Server | =2.2.1 | |
Apache Http Server | =2.0.60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2007-6750 is classified as high due to its potential for causing denial of service (DoS) attacks.
To fix CVE-2007-6750, upgrade to a patched version of Apache HTTP Server beyond the affected versions.
CVE-2007-6750 affects multiple versions of Apache HTTP Server, specifically versions 1.0 to 2.2.14.
Yes, CVE-2007-6750 can be exploited remotely through specially crafted HTTP requests.
Attackers typically use slow HTTP attacks to exploit CVE-2007-6750 and exhaust server resources.