The byte-range filter in Apache 2.0 prior to 2.0.54 allows remote malicious users to cause a denial of service (memory consumption) via an HTTP header with a large Range field.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache http server 2.0.42 |
||
apache http server 2.0.47 |
||
apache http server 2.0.50 |
||
apache http server 2.0.35 |
||
apache http server 2.0.37 |
||
apache http server 2.0.44 |
||
apache http server 2.0.39 |
||
apache http server 2.0.52 |
||
apache http server 2.0.53 |
||
apache http server 2.0.51 |
||
apache http server 2.0.28 |
||
apache http server 2.0.41 |
||
apache http server 2.0.49 |
||
apache http server 2.0.9 |
||
apache http server 2.0.32 |
||
apache http server 2.0.38 |
||
apache http server 2.0.48 |
||
apache http server 2.0.45 |
||
apache http server 2.0.40 |
||
apache http server 2.0.36 |
||
apache http server 2.0.46 |
||
apache http server 2.0.43 |
||
apache http server 2.0 |