|Bugzilla:||451615: CVE-2008-2364 httpd: mod_proxy_http DoS via excessive interim responses from the origin server|
The MITRE CVE dictionary describes this issue as:
The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2364
The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
Red Hat security errata
|Red Hat Application Stack v2 for Enterprise Linux (v.5)||RHSA-2008:0966||December 04, 2008|
|Red Hat Certificate System 7.3 for 4AS||RHSA-2010:0602||August 04, 2010|
|Red Hat Enterprise Linux version 3 (httpd)||RHSA-2008:0967||November 11, 2008|
|Red Hat Enterprise Linux version 4 (httpd)||RHSA-2008:0967||November 11, 2008|
|Red Hat Enterprise Linux version 5 (httpd)||RHSA-2008:0967||November 11, 2008|
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.