Bug#326435: CAN-2005-2728: DoS through overly long Range values passed to the byte-range filter
Package: apache2
Severity: important
Tags: security
CAN-2005-2728 describes a DoS vulnerability through overly long values
in the Range field. Please see
http://issues.apache.org/bugzilla/show_bug.cgi?id=29962
for a more complete description and a patch.
Cheers,
Moritz
-- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13
Locale: LANG=C, LC_CTYPE=de_DE.ISO-8859-15@euro (charmap=ISO-8859-15)
Reply to: