Red Hat Customer Portal

Skip to main content

CVE-2008-2364

Impact:
Moderate
Public Date:
2008-06-10
Bugzilla:
451615: CVE-2008-2364 httpd: mod_proxy_http DoS via excessive interim responses from the origin server

The MITRE CVE dictionary describes this issue as:

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

Find out more about CVE-2008-2364 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2364

The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/

Red Hat Security Errata

Platform Errata Release Date
Red Hat Application Stack v2 for Enterprise Linux (v.5) (httpd) RHSA-2008:0966 2008-12-04
Red Hat Enterprise Linux 3 (httpd) RHSA-2008:0967 2008-11-11
Red Hat Certificate System 7.3 for 4AS (xml-commons) RHSA-2010:0602 2010-08-04
Red Hat Enterprise Linux 5 (httpd) RHSA-2008:0967 2008-11-11
Red Hat Enterprise Linux 4 (httpd) RHSA-2008:0967 2008-11-11

Last Modified