Note that it is impossible to determine from apache's response alone if apache is vulnerable or not. The only way to check it is to do a request with lots of overlapping ranges (like killapache does) and check if the process size increases a lot or not. On 32bit machines, the original vulnerability caused an increase by 70-90MB per process/thread. On 64bit machines, the increase was even larger.
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/839569 Title: Apache2 is still Range header DoS vulnerable if gzip compression is enabled To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/839569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs