This service will be undergoing maintenance at 20:00 UTC, 2017-04-03. It is expected to last about 30 minutes
Bug 250731 - (CVE-2007-3847) CVE-2007-3847 httpd out of bounds read
CVE-2007-3847 httpd out of bounds read
Status: RELEASE_PENDING
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
public=20070801,reported=20070801,sou...
: Security
Depends On: 413891 250755 250756 250757 250758 250759 250760 250761 251113 251114 411711 414281 582767
Blocks:
  Show dependency treegraph
 
Reported: 2007-08-03 05:39 EDT by Mark J. Cox (Product Security)
Modified: 2016-03-04 07:28 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Mark J. Cox (Product Security) 2007-08-03 05:39:38 EDT
A buffer "over-read" flaw was found in Apache httpd used for caching.  This
allows a malicious origin server to possibly cause a process crash on a caching
forward proxy, which is a DoS for a threaded MPM on httpd 2.0+

On httpd 1.3 this would cause a client crash but this is not considered a
security issue as httpd would continue to run and spawn new children as required.

        http://marc.info/?l=apache-httpd-dev&m=118595556504202&w=2
Comment 10 errata-xmlrpc 2010-08-04 17:32:35 EDT
This issue has been addressed in following products:

  Red Hat Certificate System 7.3

Via RHSA-2010:0602 https://rhn.redhat.com/errata/RHSA-2010-0602.html

Note You need to log in before you can comment on or make changes to this bug.