Vulnerability identifier: #VU61287
Vulnerability risk: Medium
Exploitation vector: Network
Exploit availability: No
Vendor: Apache Foundation
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized value in r:parsebody. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Install updates from vendor's website.
Vulnerable software versions
Apache HTTP Server: 2.4.0 - 2.4.52
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?