CVE-2009-1890

Publication date 5 July 2009

Last updated 24 July 2024


Ubuntu priority

The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.

Read the notes from the security team

Status

Package Ubuntu Release Status
apache2 9.04 jaunty
Fixed 2.2.11-2ubuntu2.2
8.10 intrepid
Fixed 2.2.9-7ubuntu3.2
8.04 LTS hardy
Fixed 2.2.8-1ubuntu0.10
6.06 LTS dapper
Not affected

Notes


mdeslaur

couldn't reproduce on dapper, code is different

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
apache2

References

Related Ubuntu Security Notices (USN)

    • USN-802-1
    • Apache vulnerabilities
    • 13 July 2009

Other references