First published: Wed Jul 01 2009(Updated: )
François Guerraz reported in Debian BTS a possible DoS (CPU consumption) a DoS with mod_deflate since it does not stop to compress large files even after the network connection has been closed. This allows to use large amounts of CPU if there is a largish file available that has mod_deflate enabled. Original report: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712</a> Post to the apache-httpd-dev mailing list: <a href="http://marc.info/?l=apache-httpd-dev&m=124621326524824&w=2">http://marc.info/?l=apache-httpd-dev&m=124621326524824&w=2</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | >=2.0.35<2.0.64 | |
Apache Http Server | >=2.2.0<2.2.12 | |
Debian | =4.0 | |
Debian | =5.0 | |
Debian | =6.0 | |
Fedora | =11 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.04 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux eus | =5.3 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server aus | =5.3 | |
redhat enterprise Linux workstation | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1891 is classified as a denial of service (DoS) vulnerability due to excessive CPU consumption.
To mitigate CVE-2009-1891, it is recommended to upgrade Apache HTTP Server to a version beyond 2.0.64 or 2.2.12.
CVE-2009-1891 affects Apache HTTP Server versions between 2.0.35 and 2.0.64, as well as 2.2.0 to 2.2.12.
Yes, CVE-2009-1891 can be exploited on Debian systems running affected versions of the Apache HTTP Server.
CVE-2009-1891 primarily affects Apache HTTP Server installations on Debian, Fedora, and Ubuntu operating systems.