Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-2791

Опубликовано: 23 июл. 2010
Источник: redhat
CVSS2: 5
EPSS Низкий

Описание

mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=617523httpd: Reverse proxy sends wrong responses after time-outs

EPSS

Процентиль: 89%
0.04989
Низкий

5 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 15 лет назад

mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.

nvd
почти 15 лет назад

mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.

debian
почти 15 лет назад

mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, ...

github
около 3 лет назад

mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.

oracle-oval
почти 15 лет назад

ELSA-2010-0659: httpd security and bug fix update (MODERATE)

EPSS

Процентиль: 89%
0.04989
Низкий

5 Medium

CVSS2

Уязвимость CVE-2010-2791