Description
cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
Published: 2007-06-27
Score: 5.0 Medium
EPSS: 28.0% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-499-1 Apache vulnerabilities
References
Link Providers
http://bugs.gentoo.org/show_bug.cgi?id=186219 cve-icon cve-icon
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=244658 cve-icon cve-icon
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 cve-icon cve-icon
http://httpd.apache.org/security/vulnerabilities_20.html cve-icon cve-icon
http://httpd.apache.org/security/vulnerabilities_22.html cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html cve-icon cve-icon
http://lists.vmware.com/pipermail/security-announce/2009/000062.html cve-icon cve-icon
http://osvdb.org/37079 cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2007-0534.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2007-0556.html cve-icon cve-icon
http://secunia.com/advisories/25830 cve-icon cve-icon
http://secunia.com/advisories/25873 cve-icon cve-icon
http://secunia.com/advisories/25920 cve-icon cve-icon
http://secunia.com/advisories/26273 cve-icon cve-icon
http://secunia.com/advisories/26443 cve-icon cve-icon
http://secunia.com/advisories/26508 cve-icon cve-icon
http://secunia.com/advisories/26822 cve-icon cve-icon
http://secunia.com/advisories/26842 cve-icon cve-icon
http://secunia.com/advisories/26993 cve-icon cve-icon
http://secunia.com/advisories/27037 cve-icon cve-icon
http://secunia.com/advisories/27563 cve-icon cve-icon
http://secunia.com/advisories/27732 cve-icon cve-icon
http://secunia.com/advisories/28606 cve-icon cve-icon
http://secunia.com/advisories/30430 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200711-06.xml cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm cve-icon cve-icon
http://svn.apache.org/viewvc?view=rev&revision=535617 cve-icon cve-icon
http://www-1.ibm.com/support/docview.wss?uid=swg1PK49355 cve-icon cve-icon
http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702 cve-icon cve-icon
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:140 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:141 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_61_apache2.html cve-icon cve-icon
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0557.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/505990/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/24649 cve-icon cve-icon
http://www.securitytracker.com/id?1018303 cve-icon cve-icon
http://www.trustix.org/errata/2007/0026/ cve-icon cve-icon
http://www.ubuntu.com/usn/usn-499-1 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA08-150A.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/2727 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/3283 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/3386 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0233 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/1697 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1500 cve-icon cve-icon
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2007-1863 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9824 cve-icon cve-icon
https://rhn.redhat.com/errata/RHSA-2007-0533.html cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2007-1863 cve-icon
History

No history.

Subscriptions

Apache Http Server
Apple Mac Os X Server
Redhat Certificate System Enterprise Linux Rhel Application Stack
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T13:13:41.386Z

Reserved: 2007-04-04T00:00:00.000Z

Link: CVE-2007-1863

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2007-06-27T17:30:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2007-1863

cve-icon Redhat

Severity : Moderate

Publid Date: 2007-05-02T00:00:00Z

Links: CVE-2007-1863 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses