The deflateinfilter function in moddeflate.c in the moddeflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "apache2-suexec": "2.4.7-1ubuntu4.1", "apache2-suexec-custom": "2.4.7-1ubuntu4.1", "libapache2-mod-proxy-html": "1:2.4.7-1ubuntu4.1", "apache2-dev": "2.4.7-1ubuntu4.1", "apache2-bin": "2.4.7-1ubuntu4.1", "apache2-suexec-pristine": "2.4.7-1ubuntu4.1", "apache2-doc": "2.4.7-1ubuntu4.1", "apache2-mpm-event": "2.4.7-1ubuntu4.1", "apache2": "2.4.7-1ubuntu4.1", "apache2-dbg": "2.4.7-1ubuntu4.1", "apache2-data": "2.4.7-1ubuntu4.1", "apache2-mpm-prefork": "2.4.7-1ubuntu4.1", "apache2-mpm-itk": "2.4.7-1ubuntu4.1", "libapache2-mod-macro": "1:2.4.7-1ubuntu4.1", "apache2.2-bin": "2.4.7-1ubuntu4.1", "apache2-utils": "2.4.7-1ubuntu4.1", "apache2-mpm-worker": "2.4.7-1ubuntu4.1" } ] }