A flaw in Apache 2.0 could allow a remote attacker to cause a Denial of Service.
Package | www-servers/apache on all architectures |
---|---|
Affected versions | < 2.0.52-r1 |
Unaffected versions | >= 2.0.52-r1 < 2.0 |
The Apache HTTP Server is one of the most popular web servers on the Internet.
Chintan Trivedi discovered a vulnerability in Apache httpd 2.0 that is caused by improper enforcing of the field length limit in the header-parsing code.
By sending a large amount of specially-crafted HTTP GET requests a remote attacker could cause a Denial of Service of the targeted system.
There is no known workaround at this time.
All Apache 2.0 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.52-r1"
Release date
November 10, 2004
Latest revision
December 30, 2007: 02
Severity
normal
Exploitable
remote
Bugzilla entries