First published: Sun Jul 05 2009(Updated: )
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | >=2.2.0<2.2.12 | |
Fedoraproject Fedora | =11 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =6.0 | |
Canonical Ubuntu Linux | =9.04 | |
Canonical Ubuntu Linux | =8.10 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =6.06 | |
Redhat Enterprise Linux Server | =5.0 | |
Redhat Enterprise Linux Workstation | =5.0 | |
Redhat Enterprise Linux Desktop | =5.0 | |
Redhat Enterprise Linux Server Aus | =5.3 | |
Redhat Enterprise Linux Eus | =5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.