The Apache HTTP Server is a popular web server.
A flaw was found in the way the Apache HTTP Server handled Range HTTP headers. A remote attacker could use this flaw to cause httpd to use an excessive amount of memory and CPU time via HTTP requests with a specially-crafted Range header. (CVE-2011-3192 __)
All httpd users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, the httpd daemon must be restarted for the update to take effect.
Run yum update httpd to update your system.
i686: httpd-devel-2.2.21-1.18.amzn1.i686 httpd-debuginfo-2.2.21-1.18.amzn1.i686 httpd-2.2.21-1.18.amzn1.i686 httpd-tools-2.2.21-1.18.amzn1.i686 mod_ssl-2.2.21-1.18.amzn1.i686 noarch: httpd-manual-2.2.21-1.18.amzn1.noarch src: httpd-2.2.21-1.18.amzn1.src x86_64: mod_ssl-2.2.21-1.18.amzn1.x86_64 httpd-tools-2.2.21-1.18.amzn1.x86_64 httpd-2.2.21-1.18.amzn1.x86_64 httpd-devel-2.2.21-1.18.amzn1.x86_64 httpd-debuginfo-2.2.21-1.18.amzn1.x86_64