The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "apache2-suexec": "2.4.7-1ubuntu4.1", "apache2-suexec-custom": "2.4.7-1ubuntu4.1", "libapache2-mod-proxy-html": "1:2.4.7-1ubuntu4.1", "apache2-dev": "2.4.7-1ubuntu4.1", "apache2-bin": "2.4.7-1ubuntu4.1", "apache2-suexec-pristine": "2.4.7-1ubuntu4.1", "apache2-doc": "2.4.7-1ubuntu4.1", "apache2-mpm-event": "2.4.7-1ubuntu4.1", "apache2": "2.4.7-1ubuntu4.1", "apache2-dbg": "2.4.7-1ubuntu4.1", "apache2-data": "2.4.7-1ubuntu4.1", "apache2-mpm-prefork": "2.4.7-1ubuntu4.1", "apache2-mpm-itk": "2.4.7-1ubuntu4.1", "libapache2-mod-macro": "1:2.4.7-1ubuntu4.1", "apache2.2-bin": "2.4.7-1ubuntu4.1", "apache2-utils": "2.4.7-1ubuntu4.1", "apache2-mpm-worker": "2.4.7-1ubuntu4.1" } ] }