Vulnerability identifier: #VU11281
Vulnerability risk: Medium
Exploitation vector: Network
Exploit availability: No
Vendor: Apache Foundation
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to improper validation of user-supplied input. A remote attacker can send a specially crafted HTTP request to trigger an out-of-bounds memory access error after a header size limit has been reached to cause the target service to crash.
Update to version 2.4.32.
Vulnerable software versions
Apache HTTP Server: 2.4.1 - 2.4.29
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?