HTTP: Apache APR_PSPrintf Memory Corruption
This signature detects attempts to exploit a known vulnerability against the Apache HTTP service. Attackers can send overly long header lines to an Apache HTTP server attempting to create a denial of service (DoS) and possibly execute arbitrary code through long strings.
Extended Description
The Apache Software Foundation has released version 2.0.46, which addresses a vulnerability in the web server. This is due to a potential memory management issue in the apr_psprintf() Apache Portable Runtime (APR) library. Exploitation could occur through mod_dav or other components. It has also been conjectured that exploitation could allow for execution of arbitrary code. Further details regarding this issue are pending from the vendor.
Affected Products
Apache_software_foundation apache
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Apache_software_foundation
Hp
5.0