Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-2364

Опубликовано: 10 июн. 2008
Источник: redhat

Описание

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

Отчет

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2364 The Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Directory Server 8httpdWill not fix
Red Hat Certificate System 7.3antFixedRHSA-2010:060204.08.2010
Red Hat Certificate System 7.3avalon-logkitFixedRHSA-2010:060204.08.2010
Red Hat Certificate System 7.3axisFixedRHSA-2010:060204.08.2010
Red Hat Certificate System 7.3classpathx-jafFixedRHSA-2010:060204.08.2010
Red Hat Certificate System 7.3classpathx-mailFixedRHSA-2010:060204.08.2010
Red Hat Certificate System 7.3geronimo-specsFixedRHSA-2010:060204.08.2010
Red Hat Certificate System 7.3jakarta-commons-modelerFixedRHSA-2010:060204.08.2010
Red Hat Certificate System 7.3log4jFixedRHSA-2010:060204.08.2010
Red Hat Certificate System 7.3mx4jFixedRHSA-2010:060204.08.2010

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=451615httpd: mod_proxy_http DoS via excessive interim responses from the origin server

Связанные уязвимости

ubuntu
около 17 лет назад

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

nvd
около 17 лет назад

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

debian
около 17 лет назад

The ap_proxy_http_process_response function in mod_proxy_http.c in the ...

github
около 3 лет назад

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

oracle-oval
больше 16 лет назад

ELSA-2008-0967: httpd security and bug fix update (MODERATE)