CVE-2010-0408

MEDIUM

Description

The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.

References

http://httpd.apache.org/security/vulnerabilities_22.html

http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html

http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html

http://marc.info/?l=bugtraq&m=127557640302499&w=2

http://secunia.com/advisories/39100

http://secunia.com/advisories/39501

http://secunia.com/advisories/39628

http://secunia.com/advisories/39632

http://secunia.com/advisories/39656

http://secunia.com/advisories/40096

http://support.apple.com/kb/HT4435

http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/modules/proxy/mod_proxy_ajp.c?r1=917876&r2=917875&pathrev=917876

http://svn.apache.org/viewvc?view=revision&revision=917876

http://www.debian.org/security/2010/dsa-2035

http://www.mandriva.com/security/advisories?name=MDVSA-2010:053

http://www.mandriva.com/security/advisories?name=MDVSA-2013:150

http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html

http://www.redhat.com/support/errata/RHSA-2010-0168.html

http://www.securityfocus.com/bid/38491

http://www.vupen.com/english/advisories/2010/0911

http://www.vupen.com/english/advisories/2010/0994

http://www.vupen.com/english/advisories/2010/1001

http://www.vupen.com/english/advisories/2010/1057

http://www.vupen.com/english/advisories/2010/1411

http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939

http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247

http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829

https://bugzilla.redhat.com/show_bug.cgi?id=569905

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8619

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9935

Details

Source: MITRE

Published: 2010-03-05

Updated: 2018-10-30

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM