Public Date:
451615: CVE-2008-2364 httpd: mod_proxy_http DoS via excessive interim responses from the origin server

The MITRE CVE dictionary describes this issue as:

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

Find out more about CVE-2008-2364 from the MITRE CVE dictionary dictionary and NIST NVD.


Red Hat is aware of this issue and is tracking it via the following bug: The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here:

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux version 4 (httpd) RHSA-2008:0967 2008-11-11
Red Hat Enterprise Linux version 3 (httpd) RHSA-2008:0967 2008-11-11
Red Hat Application Stack v2 for Enterprise Linux (v.5) RHSA-2008:0966 2008-12-04
Red Hat Certificate System 7.3 for 4AS RHSA-2010:0602 2010-08-04
Red Hat Enterprise Linux version 5 (httpd) RHSA-2008:0967 2008-11-11