Public Date:
451615: CVE-2008-2364 httpd: mod_proxy_http DoS via excessive interim responses from the origin server

The MITRE CVE dictionary describes this issue as:

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

Find out more about CVE-2008-2364 from the MITRE CVE dictionary dictionary and NIST NVD.


Red Hat is aware of this issue and is tracking it via the following bug:

The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here:

Red Hat Security Errata

Platform Errata Release Date
Red Hat Application Stack v2 for Enterprise Linux (v.5) (httpd) RHSA-2008:0966 2008-12-04
Red Hat Enterprise Linux 3 (httpd) RHSA-2008:0967 2008-11-11
Red Hat Certificate System 7.3 for 4AS RHSA-2010:0602 2010-08-04
Red Hat Enterprise Linux 5 (httpd) RHSA-2008:0967 2008-11-11
Red Hat Enterprise Linux 4 (httpd) RHSA-2008:0967 2008-11-11

Affected Packages State

Platform Package State
Red Hat Directory Server 8 httpd Will not fix
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.
Last Modified

CVE description copyright © 2017, The MITRE Corporation