First published: Fri Jun 13 2008(Updated: )
The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | >=2.0.35<2.0.64 | |
Apache HTTP Server | >=2.2.0<2.2.9 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Fedoraproject Fedora | =8 | |
Fedoraproject Fedora | =9 | |
redhat enterprise Linux desktop | =3.0 | |
redhat enterprise Linux desktop | =4.0 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux eus | =4.7 | |
redhat enterprise Linux eus | =5.2 | |
redhat enterprise Linux server | =3.0 | |
redhat enterprise Linux server | =4.0 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux workstation | =3.0 | |
redhat enterprise Linux workstation | =4.0 | |
redhat enterprise Linux workstation | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2364 has a severity rating that indicates it can lead to denial of service due to memory consumption.
To fix CVE-2008-2364, it is recommended to upgrade to the latest version of Apache HTTP Server that addresses this vulnerability.
CVE-2008-2364 affects Apache HTTP Server versions 2.0.63 and 2.2.8, among others.
Yes, CVE-2008-2364 can be exploited remotely by a malicious HTTP server sending a large number of interim responses.
CVE-2008-2364 facilitates a denial of service attack due to memory exhaustion in the affected Apache HTTP server.