A flaw in Apache 2.0 could allow a remote attacker to cause a Denial of Service.
| Package | www-servers/apache on all architectures |
|---|---|
| Affected versions | < 2.0.52-r1 |
| Unaffected versions | >= 2.0.52-r1 < 2.0 |
The Apache HTTP Server is one of the most popular web servers on the Internet.
Chintan Trivedi discovered a vulnerability in Apache httpd 2.0 that is caused by improper enforcing of the field length limit in the header-parsing code.
By sending a large amount of specially-crafted HTTP GET requests a remote attacker could cause a Denial of Service of the targeted system.
There is no known workaround at this time.
All Apache 2.0 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.52-r1"
Release date
November 10, 2004
Latest revision
December 30, 2007: 02
Severity
normal
Exploitable
remote
Bugzilla entries