{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<p>Apache versions 2.0.54 et ant\u00e9rieures.</p>","content":"## Description\n\nUne erreur dans le composant multi-t\u00e2che worker MPM de Apache 2.0 permet\n\u00e0 un utilisateur distant mal-intentionn\u00e9 de provoquer une consommation\nexcessive de la m\u00e9moire par le biais d'une requ\u00eate HTTP malicieusement\nconstruite, occasionnant ainsi un d\u00e9ni de service.\n\n## Solution\n\nLa version 2.0.55 de Apache corrige le probl\u00e8me :\n\n    http://httpd.apache.org\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2005:233 du 19 d\u00e9cembre    2005 :","url":"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2005:233"},{"title":"Liste des changements apport\u00e9s \u00e0 la version 2.0.55 :","url":"http://httpd.apache.org/security/vulnerabilities_20.html"},{"title":"Le site de Apache :","url":"http://httpd.apache.org"},{"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SR:2005:028 du 02 d\u00e9cembre    2005 :","url":"http://www.novell.com/linux/security/advisories/2005_28_sr.html"}],"reference":"CERTA-2005-AVI-427","revisions":[{"description":"version initiale.","revision_date":"2005-11-02T00:00:00.000000"},{"description":"ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 SUSE SUSE-SR:2005:028 et Mandriva MDKSA-2005:233.","revision_date":"2005-12-21T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans Apache 2.0 permet \u00e0 un utilisateur distant de\nprovoquer un d\u00e9ni de service.\n","title":"Vuln\u00e9rabilit\u00e9 de Apache 2.0","vendor_advisories":[{"published_at":null,"title":"Liste des changements apport\u00e9s \u00e0 la version 2.0.55 d'Apache","url":null}]}
