Apache 2.0: Denial of Service by memory consumption — GLSA 200411-18

A flaw in Apache 2.0 could allow a remote attacker to cause a Denial of Service.

Affected packages

www-servers/apache on all architectures
Affected versions < 2.0.52-r1
Unaffected versions >= 2.0.52-r1
< 2.0

Background

The Apache HTTP Server is one of the most popular web servers on the Internet.

Description

Chintan Trivedi discovered a vulnerability in Apache httpd 2.0 that is caused by improper enforcing of the field length limit in the header-parsing code.

Impact

By sending a large amount of specially-crafted HTTP GET requests a remote attacker could cause a Denial of Service of the targeted system.

Workaround

There is no known workaround at this time.

Resolution

All Apache 2.0 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.52-r1"

References

Release date
November 10, 2004

Latest revision
December 30, 2007: 02

Severity
normal

Exploitable
remote

Bugzilla entries