CVE-2009-1890

The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.1 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
apachehttp_server
2.2.0 ≤
𝑥
< 2.2.12
debiandebian_linux
4.0
debiandebian_linux
5.0
debiandebian_linux
6.0
canonicalubuntu_linux
6.06
canonicalubuntu_linux
8.04
canonicalubuntu_linux
8.10
canonicalubuntu_linux
9.04
redhatenterprise_linux_desktop
5.0
redhatenterprise_linux_eus
5.3
redhatenterprise_linux_server
5.0
redhatenterprise_linux_server_aus
5.3
redhatenterprise_linux_workstation
5.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
apache2
bullseye
2.4.62-1~deb11u1
fixed
etch
not-affected
bullseye (security)
2.4.62-1~deb11u2
fixed
bookworm
2.4.62-1~deb12u1
fixed
bookworm (security)
2.4.62-1~deb12u2
fixed
sid
2.4.62-3
fixed
trixie
2.4.62-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apache2
jaunty
Fixed 2.2.11-2ubuntu2.2
released
intrepid
Fixed 2.2.9-7ubuntu3.2
released
hardy
Fixed 2.2.8-1ubuntu0.10
released
dapper
not-affected
References