First published: Sun Jul 05 2009(Updated: )
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | >=2.2.0<2.2.12 | |
Fedora | =11 | |
Debian | =5.0 | |
Debian | =4.0 | |
Debian | =6.0 | |
Ubuntu | =9.04 | |
Ubuntu | =8.10 | |
Ubuntu | =8.04 | |
Ubuntu | =6.06 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux server aus | =5.3 | |
redhat enterprise Linux eus | =5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1890 has a medium severity rating as it can lead to denial of service when exploiting the vulnerability.
To fix CVE-2009-1890, upgrade the Apache HTTP Server to version 2.3.3 or later.
CVE-2009-1890 affects multiple versions of Apache HTTP Server prior to 2.3.3, as well as specific versions of Fedora, Debian, and Ubuntu Linux.
CVE-2009-1890 is classified as a denial of service vulnerability in the Apache HTTP Server.
Yes, CVE-2009-1890 can be remotely exploited by attackers to disrupt service.