CVE-2009-1890
Published: 5 July 2009
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
Notes
Author | Note |
---|---|
mdeslaur | couldn't reproduce on dapper, code is different |
Priority
Status
Package | Release | Status |
---|---|---|
apache2 Launchpad, Ubuntu, Debian |
upstream |
Released
(2.3.3)
|
dapper |
Not vulnerable
|
|
hardy |
Released
(2.2.8-1ubuntu0.10)
|
|
intrepid |
Released
(2.2.9-7ubuntu3.2)
|
|
jaunty |
Released
(2.2.11-2ubuntu2.2)
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=rev&revision=790587 upstream: http://svn.apache.org/viewvc?view=rev&revision=790589 (test case) |