Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0434

Опубликовано: 05 мар. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3

Описание

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

РелизСтатусПримечание
dapper

released

2.0.55-4ubuntu2.10
devel

released

2.2.14-5ubuntu3
hardy

released

2.2.8-1ubuntu0.15
intrepid

released

2.2.9-7ubuntu3.6
jaunty

released

2.2.11-2ubuntu2.6
karmic

released

2.2.12-1ubuntu2.2
upstream

released

2.2.15

Показывать по

EPSS

Процентиль: 85%
0.02554
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

nvd
больше 15 лет назад

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

debian
больше 15 лет назад

The ap_read_request function in server/protocol.c in the Apache HTTP S ...

github
около 3 лет назад

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

oracle-oval
около 15 лет назад

ELSA-2010-0168: httpd security and enhancement update (MODERATE)

EPSS

Процентиль: 85%
0.02554
Низкий

4.3 Medium

CVSS2