7.1

CVE-2009-1891

Exploit

The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).

Data is provided by the National Vulnerability Database (NVD)
ApacheHTTP Server Version >= 2.0.35 < 2.0.64
ApacheHTTP Server Version >= 2.2.0 < 2.2.12
DebianDebian Linux Version4.0
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
FedoraprojectFedora Version11
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version8.10
CanonicalUbuntu Linux Version9.04
RedhatEnterprise Linux Eus Version5.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 20.93% 0.954
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.1 8.6 6.9
AV:N/AC:M/Au:N/C:N/I:N/A:C
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

http://marc.info/?l=bugtraq&m=130497311408250&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=129190899612998&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://www.vupen.com/english/advisories/2009/3184
Vendor Advisory
Permissions Required
http://secunia.com/advisories/35721
Vendor Advisory
Not Applicable
http://secunia.com/advisories/37152
Vendor Advisory
Not Applicable
http://secunia.com/advisories/37221
Vendor Advisory
Not Applicable
http://secunia.com/advisories/35793
Vendor Advisory
Not Applicable
http://secunia.com/advisories/35865
Vendor Advisory
Not Applicable
http://marc.info/?l=apache-httpd-dev&m=124621326524824&w=2
Third Party Advisory
Exploit
Mailing List
Issue Tracking
http://marc.info/?l=apache-httpd-dev&m=124661528519546&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://secunia.com/advisories/35781
Vendor Advisory
Not Applicable
http://www.securitytracker.com/id?1022529
Third Party Advisory
Broken Link
VDB Entry
http://www.vupen.com/english/advisories/2009/1841
Vendor Advisory
Permissions Required
https://bugzilla.redhat.com/show_bug.cgi?id=509125
Patch
Third Party Advisory
Issue Tracking