First published: Fri Jun 13 2008(Updated: )
The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | >=2.0.35<2.0.64 | |
Apache Http Server | >=2.2.0<2.2.9 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =6.06 | |
Red Hat Fedora | =9 | |
Red Hat Fedora | =8 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Desktop | =3.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Desktop | =4.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Server EUS | =4.7 | |
Red Hat Enterprise Linux Server | =4.0 | |
Red Hat Enterprise Linux Workstation | =4.0 | |
Red Hat Enterprise Linux Workstation | =3.0 | |
Red Hat Enterprise Linux Server | =3.0 | |
Red Hat Enterprise Linux Server EUS | =5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2364 has a severity rating that indicates it can lead to denial of service due to memory consumption.
To fix CVE-2008-2364, it is recommended to upgrade to the latest version of Apache HTTP Server that addresses this vulnerability.
CVE-2008-2364 affects Apache HTTP Server versions 2.0.63 and 2.2.8, among others.
Yes, CVE-2008-2364 can be exploited remotely by a malicious HTTP server sending a large number of interim responses.
CVE-2008-2364 facilitates a denial of service attack due to memory exhaustion in the affected Apache HTTP server.