Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
Apache "Space Headers" Denial of Service Vulnerability - Secunia Advisories - Vulnerability Intelligence - Secunia.com
[go: Go Back, main page]

Secunia Logo
 
Apache "Space Headers" Denial of Service Vulnerability
Secunia Advisory: SA13045
Release Date: 2004-11-03
Last Update: 2005-02-08
Popularity: 19,358 views

Critical:
Less critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch

Software:Apache 2.0.x

Subscribe: Instant alerts on relevant vulnerabilities

CVE reference:CVE-2004-0942


Description:
Chintan Trivedi has discovered a vulnerability in Apache, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error in the parsing routine for headers with a large amount of spaces. This can be exploited by sending some specially crafted requests with a large amount of overly long headers containing only spaces.

Successful exploitation can cause the server to become unreachable and use a large amount of CPU resources, but will regain functionality once the attack stops.

The vulnerability has been confirmed on version 2.0.52 running Linux. Other versions may also be affected.

Solution:
Update to version 2.0.53.
http://httpd.apache.org/download.cgi

Provided and/or discovered by:
Chintan Trivedi

Changelog:
2004-11-04: Added CVE reference and updated the "Solution" section.
2005-02-08: Updated "Solution" section.

Original Advisory:
http://www.apache.org/dist/httpd/CHANGES_2.0.53


Track this Secunia Advisory
Customers of the Secunia Vulnerability Intelligence solutions will automatically receive updates when new information regarding this advisory is released.

Read more about our Vulnerability Intelligence solutions and what they can do for you and your company.

About this Secunia Advisory
Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
  
Latest Advisories

Send Feedback to Secunia
If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback are most welcome.

Most Popular - 3 Hours

1. Linux Kernel "vmi_write_ldt_entry()" Privilege Escalation // 38 views
2. phpScheduleIt PHP "eval()" Injection Vulnerability // 28 views
3. XAMPP adodb.php Cross-Site Scripting Vulnerabilities // 26 views
4. WebBiscuits Multiple Products header_setup.php File Inclusion // 25 views
5. PHP infoBoard SQL Injection and Script Insertion // 25 views
6. MediaWiki "useskin" Cross-Site Scripting Vulnerability // 24 views
7. AutoNessus "remark" Cross-Site Scripting Vulnerability // 24 views
8. PowerPortal "path" Information Disclosure // 23 views
9. Novell eDirectory Multiple Vulnerabilities // 23 views
10. Apple TV Multiple Vulnerabilities // 22 views