<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>20674</bug_id>
          
          <creation_ts>2009-07-03 15:33:03 +0400</creation_ts>
          <short_desc>Apache mod_proxy Reverse Proxy Denial of Service Vulnerability</short_desc>
          <delta_ts>2009-07-31 10:57:49 +0400</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>apache2</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>http://secunia.com/advisories/35691/</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>major</bug_severity>
          <target_milestone>---</target_milestone>
          <dependson>20916</dependson>
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir Lettiev">crux</reporter>
          <assigned_to name="Anton Farygin">rider</assigned_to>
          <cc>ldv</cc>
    
    <cc>rider</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>94164</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-07-03 15:33:03 +0400</bug_when>
    <thetext>A vulnerability has been reported in the Apache mod_proxy module, which can be exploited by malicious people to potentially cause a DoS (Denial of Service).

An error exists in the mod_proxy module when functioning in reverse proxy mode. This can be exploited to consume large amounts of CPU in an affected proxy process via specially crafted proxy requests.

Fixed in svn: http://svn.apache.org/viewvc?view=rev&amp;revision=790587</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>95169</commentid>
    <comment_count>1</comment_count>
    <who name="Dmitry V. Levin">ldv</who>
    <bug_when>2009-07-24 02:32:26 +0400</bug_when>
    <thetext>*ping*</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>95185</commentid>
    <comment_count>2</comment_count>
    <who name="solo">solo</who>
    <bug_when>2009-07-24 12:04:14 +0400</bug_when>
    <thetext>В работе.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>95229</commentid>
    <comment_count>3</comment_count>
    <who name="solo">solo</who>
    <bug_when>2009-07-24 22:14:14 +0400</bug_when>
    <thetext>Правильно понимаю, что это CVE-2009-1890 (см. http://secunia.com/advisories/cve_reference/CVE-2009-1890/)?</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>95498</commentid>
    <comment_count>4</comment_count>
    <who name="solo">solo</who>
    <bug_when>2009-07-31 10:57:49 +0400</bug_when>
    <thetext>Закрыта апстримом в apache 2.2.12</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>