CVE-2009-1890
05.07.2009, 16:30
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.Enginsight
Vendor | Product | Version |
---|---|---|
apache | http_server | 2.2.0 ≤ 𝑥 < 2.2.12 |
debian | debian_linux | 4.0 |
debian | debian_linux | 5.0 |
debian | debian_linux | 6.0 |
canonical | ubuntu_linux | 6.06 |
canonical | ubuntu_linux | 8.04 |
canonical | ubuntu_linux | 8.10 |
canonical | ubuntu_linux | 9.04 |
redhat | enterprise_linux_desktop | 5.0 |
redhat | enterprise_linux_eus | 5.3 |
redhat | enterprise_linux_server | 5.0 |
redhat | enterprise_linux_server_aus | 5.3 |
redhat | enterprise_linux_workstation | 5.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References