CVE-2010-0434

MEDIUM

Description

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

References

http://httpd.apache.org/security/vulnerabilities_22.html

http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html

http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html

http://lists.vmware.com/pipermail/security-announce/2010/000105.html

http://marc.info/?l=bugtraq&m=127557640302499&w=2

http://secunia.com/advisories/39100

http://secunia.com/advisories/39115

http://secunia.com/advisories/39501

http://secunia.com/advisories/39628

http://secunia.com/advisories/39632

http://secunia.com/advisories/39656

http://secunia.com/advisories/40096

http://support.apple.com/kb/HT4435

http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/server/protocol.c?r1=917617&r2=917867&pathrev=917867&diff_format=h

http://svn.apache.org/viewvc?view=revision&revision=917867

http://svn.apache.org/viewvc?view=revision&revision=918427

http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939

http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247

http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829

http://www.debian.org/security/2010/dsa-2035

http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html

http://www.redhat.com/support/errata/RHSA-2010-0168.html

http://www.redhat.com/support/errata/RHSA-2010-0175.html

http://www.securityfocus.com/bid/38494

http://www.vmware.com/security/advisories/VMSA-2010-0014.html

http://www.vupen.com/english/advisories/2010/0911

http://www.vupen.com/english/advisories/2010/0994

http://www.vupen.com/english/advisories/2010/1001

http://www.vupen.com/english/advisories/2010/1057

http://www.vupen.com/english/advisories/2010/1411

https://bugzilla.redhat.com/show_bug.cgi?id=570171

https://exchange.xforce.ibmcloud.com/vulnerabilities/56625

https://issues.apache.org/bugzilla/show_bug.cgi?id=48359

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10358

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8695

Details

Source: MITRE

Published: 2010-03-05

Updated: 2018-10-30

Type: CWE-200

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM