Lucene search

K
gentooGentoo FoundationGLSA-200411-18
HistoryNov 10, 2004 - 12:00 a.m.

Apache 2.0: Denial of Service by memory consumption

2004-11-1000:00:00
Gentoo Foundation
security.gentoo.org
15

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.966 High

EPSS

Percentile

99.6%

Background

The Apache HTTP Server is one of the most popular web servers on the Internet.

Description

Chintan Trivedi discovered a vulnerability in Apache httpd 2.0 that is caused by improper enforcing of the field length limit in the header-parsing code.

Impact

By sending a large amount of specially-crafted HTTP GET requests a remote attacker could cause a Denial of Service of the targeted system.

Workaround

There is no known workaround at this time.

Resolution

All Apache 2.0 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.52-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-servers/apache< 2.0.52-r1UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.966 High

EPSS

Percentile

99.6%