The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "apache2",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2-bin",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2-data",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2-dev",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2-mpm-event",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2-mpm-itk",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2-mpm-prefork",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2-mpm-worker",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2-suexec",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2-suexec-custom",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2-suexec-pristine",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2-utils",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "apache2.2-bin",
            "binary_version": "2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "libapache2-mod-macro",
            "binary_version": "1:2.4.7-1ubuntu4.1"
        },
        {
            "binary_name": "libapache2-mod-proxy-html",
            "binary_version": "1:2.4.7-1ubuntu4.1"
        }
    ]
}