Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2008-2364

Published: 13 June 2008

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

Notes

AuthorNote
kees
only a problem when the server being proxied is untrusted
jdstrand
PoC: http://svn.apache.org/viewvc/httpd/test/framework/trunk/t/security/CVE-2008-2364.t?revision=666283&view=markup

Priority

Low

Status

Package Release Status
apache2
Launchpad, Ubuntu, Debian
dapper
Released (2.0.55-4ubuntu2.4)
feisty Needed
(reached end-of-life)
gutsy
Released (2.2.4-3ubuntu0.2)
hardy
Released (2.2.8-1ubuntu0.4)
intrepid
Released (2.2.9-1)
upstream
Released (2.2.9)
Patches:
upstream: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=666154&r2=666153&pathrev=666154
upstream: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=666154&r2=666180
other: http://archive.apache.org/dist/httpd/patches/apply_to_2.0.63/CVE-2008-2364-patch-2.0.txt
debdiff: http://launchpad.net/bugs/239894