A flaw in Apache 2.0 could allow a remote attacker to cause a Denial of Service.
|Package||www-servers/apache on all architectures|
|Affected versions||< 2.0.52-r1|
|Unaffected versions||>= 2.0.52-r1, < 2.0|
The Apache HTTP Server is one of the most popular web servers on the Internet.
Chintan Trivedi discovered a vulnerability in Apache httpd 2.0 that is caused by improper enforcing of the field length limit in the header-parsing code.
By sending a large amount of specially-crafted HTTP GET requests a remote attacker could cause a Denial of Service of the targeted system.
There is no known workaround at this time.
All Apache 2.0 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.52-r1"
November 10, 2004
December 30, 2007: 02