|
Apache "Space Headers" Denial of Service Vulnerability
|
|
Secunia Advisory:
|
SA13045
|
|
|
Release Date:
|
2004-11-03
|
|
Last Update:
|
2005-02-08
|
|
Popularity:
|
19,358 views
|
|
|
Critical:
|
 Less critical
|
|
Impact:
|
DoS
|
|
Where:
|
From remote
|
|
Solution Status:
|
Vendor Patch
|
|
| Software: | Apache 2.0.x
|
|
|
Subscribe:
|
Instant alerts on relevant vulnerabilities
|
|
| CVE reference: | CVE-2004-0942
|
|
Description: Chintan Trivedi has discovered a vulnerability in Apache, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the parsing routine for headers with a large amount of spaces. This can be exploited by sending some specially crafted requests with a large amount of overly long headers containing only spaces.
Successful exploitation can cause the server to become unreachable and use a large amount of CPU resources, but will regain functionality once the attack stops.
The vulnerability has been confirmed on version 2.0.52 running Linux. Other versions may also be affected.
Solution: Update to version 2.0.53.
http://httpd.apache.org/download.cgi
Provided and/or discovered by: Chintan Trivedi
Changelog: 2004-11-04: Added CVE reference and updated the "Solution" section.
2005-02-08: Updated "Solution" section.
Original Advisory: http://www.apache.org/dist/httpd/CHANGES_2.0.53
|
|
|
Track this Secunia Advisory
|
Customers of the Secunia Vulnerability Intelligence solutions will automatically receive updates when new information regarding this advisory is released.
Read more about our Vulnerability Intelligence solutions and what they can do for you and your company.
|
|
|
About this Secunia Advisory
|
Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
|