Skip to navigation

CVE Database

CVE-2008-2364

Impact: Moderate
Public: 2008-06-10
Bugzilla: 451615: CVE-2008-2364 httpd: mod_proxy_http DoS via excessive interim responses from the origin server
IAVA: 2013-A-0144

Details

The MITRE CVE dictionary describes this issue as:

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

Find out more about CVE-2008-2364 from the MITRE CVE dictionary and NIST NVD.

Statement

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2364

The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/

Red Hat security errata

Platform Errata Release Date
Red Hat Application Stack v2 for Enterprise Linux (v.5) RHSA-2008:0966 December 04, 2008
Red Hat Certificate System 7.3 for 4AS RHSA-2010:0602 August 04, 2010
Red Hat Enterprise Linux version 3 (httpd) RHSA-2008:0967 November 11, 2008
Red Hat Enterprise Linux version 4 (httpd) RHSA-2008:0967 November 11, 2008
Red Hat Enterprise Linux version 5 (httpd) RHSA-2008:0967 November 11, 2008

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.