CVE-2008-2364
mediumCVSS v3 Base Score
5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS Score
2.2%
Exploitation probability in 30 days
Top 16% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Confidentiality
None
Integrity
None
Availability
P
Vulnerability Report
Generated by CyberWatcher
Description
The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
CWE
CWE-770Affected Products
apache http servercanonical ubuntu linuxfedoraproject fedoraredhat enterprise linux desktopredhat enterprise linux eusredhat enterprise linux serverredhat enterprise linux workstation