Public Date:
451615: CVE-2008-2364 httpd: mod_proxy_http DoS via excessive interim responses from the origin server

The MITRE CVE dictionary describes this issue as:

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

Find out more about CVE-2008-2364 from the MITRE CVE dictionary dictionary and NIST NVD.


Red Hat is aware of this issue and is tracking it via the following bug:

The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here:

Red Hat Directory Server 8:
This vulnerability has been rated as having a security impact of Moderate. After evaluation and in accordance with the criteria noted in the product support life cycle, there are no plans to address this issue in an upcoming release. Please contact Red Hat Support for further information.

Red Hat Security Errata

Platform Errata Release Date
Red Hat Application Stack v2 for Enterprise Linux (v.5) (httpd) RHSA-2008:0966 2008-12-04
Red Hat Enterprise Linux 3 (httpd) RHSA-2008:0967 2008-11-11
Red Hat Certificate System 7.3 for 4AS RHSA-2010:0602 2010-08-04
Red Hat Enterprise Linux 5 (httpd) RHSA-2008:0967 2008-11-11
Red Hat Enterprise Linux 4 (httpd) RHSA-2008:0967 2008-11-11

Affected Packages State

Platform Package State
Red Hat Directory Server 8 httpd Will not fix
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.
Last Modified

CVE description copyright © 2017, The MITRE Corporation