An issue was discovered where the field length limit was not enforced for certain malicious requests. This could allow a remote attacker who is able to send large amounts of data to a server the ability to cause Apache children to consume proportional amounts of memory, leading to a denial of service. Affects: 2.0.52, 2.0.51, 2.0.50, 2.0.49, 2.0.48, 2.0.47, 2.0.46, 2.0.45, 2.0.44, 2.0.43, 2.0.42, 2.0.40, 2.0.39, 2.0.37, 2.0.36, 2.0.35 Proposed patch; http://marc.theaimsgroup.com/?l=apache-httpd-dev&m=109932823014967&w=2 Public since Nov01 CAN-2004-0942 Affects: FC2 CAN-2004-0942 Affects: FC3-3.8
Fixed in 2.0.51-2.9 for FC2: http://www.redhat.com/archives/fedora-announce-list/2004-November/msg00046.html
And fixed in 2.0.52-3.1 for FC3: http://www.redhat.com/archives/fedora-announce-list/2004-November/msg00047.html
It is exploitable in Fedora Core 1 too and fedoralegacy.org doesn't have an update yet (2.0.51-1.4.legacy).