DoS Holes Plugged in Apache HTTP Server
Page 1 of 1
The Apache Software Foundation on Monday released a new version of its open-source Web server project to plug four potentially serious security holes.
The latest update to the Apache 2.0 HTTP Server (version 2.0.47) is described
as a security and bug fix release to plug holes that could lead to
The Foundation warned that the SSLCipherSuite directive being used to upgrade from a weak ciphersuite to a strong one could result in the weak ciphersuite being used in place of the strong one. The previous Apache HTTP Server version also contains a bug in the prefork MPM where certain errors returned by accept() on rarely accessed ports could cause temporal DoS.
Another DoS security vulnerability, caused when target host is IPv6, was also patched. Apache explained that ftp proxy server can't create IPv6 socket. The Apache Foundation also warned older versions of the server would crash when going into an infinite loop because of too many subsequent internal redirects and nested subrequests.
and Sun Microsystems.