CVE-2010-0434

MEDIUM

Description

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

References

http://httpd.apache.org/security/vulnerabilities_22.html

http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html

http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html

http://lists.vmware.com/pipermail/security-announce/2010/000105.html

http://marc.info/?l=bugtraq&m=127557640302499&w=2

http://secunia.com/advisories/39100

http://secunia.com/advisories/39115

http://secunia.com/advisories/39501

http://secunia.com/advisories/39628

http://secunia.com/advisories/39632

http://secunia.com/advisories/39656

http://secunia.com/advisories/40096

http://support.apple.com/kb/HT4435

http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/server/protocol.c?r1=917617&r2=917867&pathrev=917867&diff_format=h

http://svn.apache.org/viewvc?view=revision&revision=917867

http://svn.apache.org/viewvc?view=revision&revision=918427

http://www.debian.org/security/2010/dsa-2035

http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html

http://www.redhat.com/support/errata/RHSA-2010-0168.html

http://www.redhat.com/support/errata/RHSA-2010-0175.html

http://www.securityfocus.com/bid/38494

http://www.vmware.com/security/advisories/VMSA-2010-0014.html

http://www.vupen.com/english/advisories/2010/0911

http://www.vupen.com/english/advisories/2010/0994

http://www.vupen.com/english/advisories/2010/1001

http://www.vupen.com/english/advisories/2010/1057

http://www.vupen.com/english/advisories/2010/1411

http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939

http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247

http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829

https://bugzilla.redhat.com/show_bug.cgi?id=570171

https://exchange.xforce.ibmcloud.com/vulnerabilities/56625

https://issues.apache.org/bugzilla/show_bug.cgi?id=48359

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10358

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8695

Details

Source: MITRE

Published: 2010-03-05

Updated: 2021-03-30

Type: CWE-200

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Tenable Plugins

View all (29 total)

IDNameProductFamilySeverity
69301Oracle Fusion Middleware Oracle HTTP Server Multiple VulnerabilitiesNessusWeb Servers
critical
68024Oracle Linux 4 : httpd (ELSA-2010-0175)NessusOracle Linux Local Security Checks
medium
68022Oracle Linux 5 : httpd (ELSA-2010-0168)NessusOracle Linux Local Security Checks
medium
60754Scientific Linux Security Update : httpd on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60753Scientific Linux Security Update : httpd on SL4.x i386/x86_64NessusScientific Linux Local Security Checks
medium
59678GLSA-201206-25 : Apache HTTP Server: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
50889SuSE 11 Security Update : Apache 2 (SAT Patch Number 2293)NessusSuSE Local Security Checks
medium
800791Mac OS X 10.6 < 10.6.5 Multiple VulnerabilitiesLog Correlation EngineOperating System Detection
high
5705Mac OS X 10.6 < 10.6.5 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
50548Mac OS X 10.6.x < 10.6.5 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
50069Apache 2.0.x < 2.0.64 Multiple VulnerabilitiesNessusWeb Servers
high
45004Apache 2.2.x < 2.2.15 Multiple VulnerabilitiesNessusWeb Servers
critical
49827SuSE 10 Security Update : Apache 2 (ZYPP Patch Number 6987)NessusSuSE Local Security Checks
medium
47417Fedora 11 : httpd-2.2.15-1.fc11.1 (2010-6131)NessusFedora Local Security Checks
medium
47412Fedora 12 : httpd-2.2.15-1.fc12.2 (2010-6055)NessusFedora Local Security Checks
medium
47408Fedora 13 : httpd-2.2.15-1.fc13 (2010-5942)NessusFedora Local Security Checks
medium
46281RHEL 4 : httpd (RHSA-2010:0175)NessusRed Hat Local Security Checks
medium
46279RHEL 5 : httpd (RHSA-2010:0168)NessusRed Hat Local Security Checks
medium
46013SuSE 10 Security Update : Apache 2 (ZYPP Patch Number 6984)NessusSuSE Local Security Checks
medium
46011openSUSE Security Update : apache2 (openSUSE-SU-2010:0165-1)NessusSuSE Local Security Checks
medium
46009openSUSE Security Update : apache2 (openSUSE-SU-2010:0165-1)NessusSuSE Local Security Checks
medium
46006openSUSE Security Update : apache2 (openSUSE-SU-2010:0165-1)NessusSuSE Local Security Checks
medium
45557Debian DSA-2035-1 : apache2 - multiple issuesNessusDebian Local Security Checks
medium
45368CentOS 4 : httpd (CESA-2010:0175)NessusCentOS Local Security Checks
medium
45367CentOS 5 : httpd (CESA-2010:0168)NessusCentOS Local Security Checks
medium
45037Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : apache2 vulnerabilities (USN-908-1)NessusUbuntu Local Security Checks
medium
800554Apache < 2.2.15 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
high
5356Apache < 2.2.15 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
critical
44997Mandriva Linux Security Advisory : apache (MDVSA-2010:057)NessusMandriva Local Security Checks
medium