Total vulnerabilities in the database
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
Software | From | Fixed in |
---|---|---|
apache / http_server | 2.2.0 | 2.2.12 |
fedoraproject / fedora | 11 | 11.x |
debian / debian_linux | 5.0 | 5.0.x |
debian / debian_linux | 4.0 | 4.0.x |
debian / debian_linux | 6.0 | 6.0.x |
canonical / ubuntu_linux | 9.04 | 9.04.x |
canonical / ubuntu_linux | 8.10 | 8.10.x |
canonical / ubuntu_linux | 8.04 | 8.04.x |
canonical / ubuntu_linux | 6.06 | 6.06.x |
redhat / enterprise_linux_server | 5.0 | 5.0.x |
redhat / enterprise_linux_workstation | 5.0 | 5.0.x |
redhat / enterprise_linux_desktop | 5.0 | 5.0.x |
redhat / enterprise_linux_server_aus | 5.3 | 5.3.x |
redhat / enterprise_linux_eus | 5.3 | 5.3.x |