Apache HTTP Server mod_rpaf x-forwarded-for Denial of Service - Improved Confidence (CVE-2012-3526)
| Check Point Reference: | CPAI-2013-1625 | |
| Date Published: | ||
| Severity: | ||
| Source: | Debian Advisory 683984 | |
| Industry Reference(s): | CVE-2012-3526 |
|
| Protection Provided by: |
Security Gateway
|
|
|
Who is Vulnerable? Apache Software Foundation HTTP Server mod_rpaf 0.5 |
||
| Vulnerability Description A denial of service vulnerability has been reported in Apache's HTTP Server. The vulnerability is caused due to an error while processing certain http headers. A remote attacker can exploit this vulnerability by sending specially crafted HTTP requests to a target. Successful exploitation will lead to a Denial-of-Service condition on the apache server. |
||
Protection Overview
This protection will detect and block attempts to exploit this vulnerability.
To configure the defense, select your product from the list below and follow the related protection steps.