7.1

CVE-2009-1890

The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheHTTP Server Version >= 2.2.0 < 2.2.12
FedoraprojectFedora Version11
DebianDebian Linux Version4.0
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version8.10
CanonicalUbuntu Linux Version9.04
RedhatEnterprise Linux Eus Version5.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 21.52% 0.955
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.1 8.6 6.9
AV:N/AC:M/Au:N/C:N/I:N/A:C
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

http://marc.info/?l=bugtraq&m=129190899612998&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://www.vupen.com/english/advisories/2009/3184
Vendor Advisory
Permissions Required
http://secunia.com/advisories/37152
Vendor Advisory
Not Applicable
http://secunia.com/advisories/37221
Vendor Advisory
Not Applicable
http://secunia.com/advisories/35691
Vendor Advisory
Not Applicable
http://www.securityfocus.com/bid/35565
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1022509
Third Party Advisory
Broken Link
VDB Entry