CVE-2010-1452

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.

References

https://issues.apache.org/bugzilla/show_bug.cgi?id=49246

http://httpd.apache.org/security/vulnerabilities_22.html

http://marc.info/?l=apache-announce&m=128009718610929&w=2

http://www.redhat.com/support/errata/RHSA-2010-0659.html

http://www.vupen.com/english/advisories/2010/2218

http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.467395

http://ubuntu.com/usn/usn-1021-1

http://secunia.com/advisories/42367

http://www.vupen.com/english/advisories/2010/3064

http://marc.info/?l=bugtraq&m=129190899612998&w=2

http://www.vupen.com/english/advisories/2011/0291

http://blogs.sun.com/security/entry/cve_2010_1452_mod_dav

http://support.apple.com/kb/HT4581

http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html

http://www.redhat.com/support/errata/RHSA-2011-0897.html

http://www.redhat.com/support/errata/RHSA-2011-0896.html

http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html

http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html

http://marc.info/?l=bugtraq&m=133355494609819&w=2

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12341

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11683

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/r5f9c22f9c2[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

Details

Source: MITRE

Published: 2010-07-28

Updated: 2021-06-06

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (23 total)

IDNameProductFamilySeverity
127360NewStart CGSL MAIN 4.05 : httpd Multiple Vulnerabilities (NS-SA-2019-0118)NessusNewStart CGSL Local Security Checks
critical
68091Oracle Linux 5 : httpd (ELSA-2010-0659)NessusOracle Linux Local Security Checks
medium
67078CentOS 5 : httpd (CESA-2010:0659)NessusCentOS Local Security Checks
medium
60847Scientific Linux Security Update : httpd on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
59678GLSA-201206-25 : Apache HTTP Server: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
58811HP System Management Homepage < 7.0 Multiple VulnerabilitiesNessusWeb Servers
critical
57088SuSE 11.1 Security Update : Apache (SAT Patch Number 5090)NessusSuSE Local Security Checks
high
55998Debian DSA-2298-2 : apache2 - denial of serviceNessusDebian Local Security Checks
high
52754Mac OS X 10.6.x < 10.6.7 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
high
52753Mac OS X Multiple Vulnerabilities (Security Update 2011-001)NessusMacOS X Local Security Checks
high
800796Mac OS X 10.6 < 10.6.7 Multiple VulnerabilitiesLog Correlation EngineOperating System Detection
high
5826Mac OS X 10.6 < 10.6.7 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
50823Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : apache2 vulnerabilities (USN-1021-1)NessusUbuntu Local Security Checks
medium
50069Apache 2.0.x < 2.0.64 Multiple VulnerabilitiesNessusWeb Servers
high
48934RHEL 5 : httpd (RHSA-2010:0659)NessusRed Hat Local Security Checks
medium
48920Slackware 12.0 / 12.1 / 12.2 / 13.0 / 13.1 / current : httpd (SSA:2010-240-02)NessusSlackware Local Security Checks
medium
48347Mandriva Linux Security Advisory : apache (MDVSA-2010:153)NessusMandriva Local Security Checks
medium
48346Mandriva Linux Security Advisory : apache (MDVSA-2010:152)NessusMandriva Local Security Checks
medium
48327Fedora 13 : httpd-2.2.16-1.fc13 (2010-12478)NessusFedora Local Security Checks
medium
48205Apache 2.2.x < 2.2.16 Multiple VulnerabilitiesNessusWeb Servers
medium
800573Apache 2.2 < 2.2.16 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
high
5615Apache 2.2 < 2.2.16 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
medium
47818FreeBSD : apache -- Remote DoS bug in mod_cache and mod_dav (28a7310f-9855-11df-8d36-001aa0166822)NessusFreeBSD Local Security Checks
medium