CVE-2009-1891

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).

References

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712

http://www.mandriva.com/security/advisories?name=MDVSA-2009:149

https://bugzilla.redhat.com/show_bug.cgi?id=509125

http://marc.info/?l=apache-httpd-dev&m=124661528519546&w=2

https://rhn.redhat.com/errata/RHSA-2009-1148.html

http://marc.info/?l=apache-httpd-dev&m=124621326524824&w=2

http://secunia.com/advisories/35865

http://www.debian.org/security/2009/dsa-1834

http://www.redhat.com/support/errata/RHSA-2009-1156.html

http://www.securitytracker.com/id?1022529

http://secunia.com/advisories/35781

http://secunia.com/advisories/35793

http://secunia.com/advisories/35721

http://www.vupen.com/english/advisories/2009/1841

http://security.gentoo.org/glsa/glsa-200907-04.xml

http://osvdb.org/55782

http://www.ubuntu.com/usn/USN-802-1

https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html

http://secunia.com/advisories/37152

http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html

http://support.apple.com/kb/HT3937

http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html

http://www.vupen.com/english/advisories/2009/3184

http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361

http://secunia.com/advisories/37221

http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480

http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142

http://wiki.rpath.com/Advisories:rPSA-2009-0142

http://marc.info/?l=bugtraq&m=129190899612998&w=2

http://marc.info/?l=bugtraq&m=130497311408250&w=2

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361

http://www.securityfocus.com/archive/1/507857/100/0/threaded

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/r2cb985de917e[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

Details

Source: MITRE

Published: 2009-07-10

Updated: 2021-06-06

Type: CWE-399

Risk Information

CVSS v2

Base Score: 7.1

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 8.6

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:0.8.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:0.8.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* versions up to 2.2.11 (inclusive)

cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.2.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.38:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.33:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.99:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*

Tenable Plugins

View all (36 total)

IDNameProductFamilySeverity
67959Oracle Linux 4 : httpd (ELSA-2009-1580)NessusOracle Linux Local Security Checks
high
67908Oracle Linux 3 : httpd (ELSA-2009-1205)NessusOracle Linux Local Security Checks
critical
67890Oracle Linux 5 : httpd (ELSA-2009-1148)NessusOracle Linux Local Security Checks
high
67074CentOS 4 : httpd (CESA-2009:1580)NessusCentOS Local Security Checks
high
60695Scientific Linux Security Update : httpd on SL3.x, SL4.x, SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
60636Scientific Linux Security Update : httpd on SL3.x i386/x86_64NessusScientific Linux Local Security Checks
critical
60614Scientific Linux Security Update : httpd on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
50069Apache 2.0.x < 2.0.64 Multiple VulnerabilitiesNessusWeb Servers
high
49826SuSE 10 Security Update : Apache 2 (ZYPP Patch Number 6572)NessusSuSE Local Security Checks
high
44699Debian DSA-1834-1 : apache2 - denial of serviceNessusDebian Local Security Checks
high
43768CentOS 5 : httpd (CESA-2009:1148)NessusCentOS Local Security Checks
high
43042Mandriva Linux Security Advisory : apache (MDVSA-2009:323)NessusMandriva Local Security Checks
high
42470RHEL 4 : httpd (RHSA-2009:1580)NessusRed Hat Local Security Checks
high
800795Mac OS X 10.6 < 10.6.2 Multiple VulnerabilitiesLog Correlation EngineOperating System Detection
high
5227Mac OS X 10.6 < 10.6.2 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
42434Mac OS X 10.6.x < 10.6.2 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
42433Mac OS X Multiple Vulnerabilities (Security Update 2009-006)NessusMacOS X Local Security Checks
critical
42319openSUSE 10 Security Update : apache2 (apache2-6576)NessusSuSE Local Security Checks
high
42253SuSE 10 Security Update : Apache 2 (ZYPP Patch Number 6571)NessusSuSE Local Security Checks
high
42252SuSE 11 Security Update : Apache 2 (SAT Patch Number 1417)NessusSuSE Local Security Checks
high
42248openSUSE Security Update : apache2 (apache2-1419)NessusSuSE Local Security Checks
high
42245openSUSE Security Update : apache2 (apache2-1419)NessusSuSE Local Security Checks
high
42243SuSE9 Security Update : Apache 2 (YOU Patch Number 12526)NessusSuSE Local Security Checks
high
40833Fedora 11 : httpd-2.2.13-1.fc11 (2009-8812)NessusFedora Local Security Checks
high
40760FreeBSD : apache22 -- several vulnerabilities (e15f2356-9139-11de-8f42-001aa0166822)NessusFreeBSD Local Security Checks
high
40655Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : apache2 regression (USN-802-2)NessusUbuntu Local Security Checks
high
40543RHEL 3 : httpd (RHSA-2009:1205)NessusRed Hat Local Security Checks
critical
40532CentOS 3 : httpd (CESA-2009:1205)NessusCentOS Local Security Checks
critical
800567Apache < 2.2.12 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
medium
5111Apache < 2.2.12 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
medium
40459Slackware 12.0 / 12.1 / 12.2 / current : httpd (SSA:2009-214-01)NessusSlackware Local Security Checks
high
40467Apache 2.2.x < 2.2.12 Multiple VulnerabilitiesNessusWeb Servers
high
39789Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : apache2 vulnerabilities (USN-802-1)NessusUbuntu Local Security Checks
high
39775GLSA-200907-04 : Apache: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
39803Mandriva Linux Security Advisory : apache (MDVSA-2009:149)NessusMandriva Local Security Checks
high
39770RHEL 5 : httpd (RHSA-2009:1148)NessusRed Hat Local Security Checks
high