Joined: 13 Jun 2003
Location: Dresden, Germany
|Posted: Wed Nov 10, 2004 6:56 pm Post subject: [ GLSA 200411-18 ] Apache 2.0: Denial of Service by memory c
|Gentoo Linux Security Advisory
Title: Apache 2.0: Denial of Service by memory consumption (GLSA 200411-18)
Date: November 10, 2004
Updated: December 30, 2007
A flaw in Apache 2.0 could allow a remote attacker to cause a Denial of Service.
The Apache HTTP Server is one of the most popular web servers on the Internet.
Vulnerable: < 2.0.52-r1
Unaffected: >= 2.0.52-r1
Unaffected: < 2.0
Architectures: All supported architectures
Chintan Trivedi discovered a vulnerability in Apache httpd 2.0 that is caused by improper enforcing of the field length limit in the header-parsing code.
By sending a large amount of specially-crafted HTTP GET requests a remote attacker could cause a Denial of Service of the targeted system.
There is no known workaround at this time.
All Apache 2.0 users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.52-r1"
Security vulnerabilities in Apache httpd 2.0
Last edited by GLSA on Tue Sep 30, 2008 4:16 am; edited 4 times in total