Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0408

Опубликовано: 05 мар. 2010
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5

Описание

The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.

РелизСтатусПримечание
dapper

not-affected

devel

released

2.2.14-5ubuntu3
hardy

released

2.2.8-1ubuntu0.15
intrepid

released

2.2.9-7ubuntu3.6
jaunty

released

2.2.11-2ubuntu2.6
karmic

released

2.2.12-1ubuntu2.2
upstream

released

2.2.15

Показывать по

EPSS

Процентиль: 96%
0.25072
Средний

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.

nvd
больше 15 лет назад

The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.

debian
больше 15 лет назад

The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp ...

github
около 3 лет назад

The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.

oracle-oval
около 15 лет назад

ELSA-2010-0168: httpd security and enhancement update (MODERATE)

EPSS

Процентиль: 96%
0.25072
Средний

5 Medium

CVSS2