Secunia Security Advisory - keilh has reported a vulnerability in Apache 2 mod_ssl, which can be exploited by malicious people to cause a DoS (Denial of Service).
b58bd8ad5a81d43411dce54ffdb6b04bced4180ef228cebe248789256fea8913
TITLE:
Apache 2 mod_ssl Denial of Service Vulnerability
SECUNIA ADVISORY ID:
SA18307
VERIFY ADVISORY:
http://secunia.com/advisories/18307/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
Apache 2.0.x
http://secunia.com/product/73/
DESCRIPTION:
keilh has reported a vulnerability in Apache 2 mod_ssl, which can be
exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to a NULL pointer dereference error
in mod_ssl. This can be exploited to crash Apache via a specially
crafted request.
Successful exploitation requires that the server is using the
non-default worker MPM, is configured with a SSL virtual host with
access control, and using a custom 400 error document.
SOLUTION:
The vulnerability has been fixed in the CVS repositories.
PROVIDED AND/OR DISCOVERED BY:
keilh
ORIGINAL ADVISORY:
Apache Bugzilla:
http://issues.apache.org/bugzilla/show_bug.cgi?id=37791
Red Hat Bugzilla:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175720
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------