Описание
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | not-affected | 2.2.11-7ubuntu1 |
hardy | released | 2.2.8-1ubuntu0.10 |
intrepid | released | 2.2.9-7ubuntu3.2 |
jaunty | released | 2.2.11-2ubuntu2.2 |
upstream | released | 2.3.3 |
Показывать по
7.1 High
CVSS2
Связанные уязвимости
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy mo ...
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
7.1 High
CVSS2