A flaw was found in Apache 2.0 where the byterange filter would buffer responses into memory. This could cause a Denial of Service through memory leak if a remote attacker sends carefully crafted requests to a web server that has a CGI script which usually would give a large response.
Created attachment 118245 [details] Proposed patch from Joe Orton
Note that this also affects any dynamic response generator such as PHP.
*** Bug 167103 has been marked as a duplicate of this bug. ***
removing from U2proposed as this will go out in an async RHSA first for RHEL3&4
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-608.html