National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2010-0434 Detail

Description

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

Source:  MITRE      Last Modified:  03/05/2010

Quick Info

CVE Dictionary Entry:
CVE-2010-0434
Original release date:
03/05/2010
Last revised:
09/18/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.3 MEDIUM
Vector:
(AV:N/AC:M/Au:N/C:P/I:N/A:N) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information

Vendor Statements (disclaimer)

Official Statement from Red Hat (04/13/2010)

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0434 This issue was fixed in Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2010-0168.html This issue was fixed in Red Hat Enterprise Linux 4 via: https://rhn.redhat.com/errata/RHSA-2010-0175.html The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw on Red Hat Enterprise Linux 3. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://httpd.apache.org/security/vulnerabilities_22.html Patch; Vendor Advisory External Source CONFIRM http://httpd.apache.org/security/vulnerabilities_22.html
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html External Source APPLE APPLE-SA-2010-11-10-1
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html External Source FEDORA FEDORA-2010-5942
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html External Source FEDORA FEDORA-2010-6131
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html External Source SUSE SUSE-SR:2010:010
http://lists.vmware.com/pipermail/security-announce/2010/000105.html External Source MLIST [security-announce] 20100923 VMSA-2010-0014 VMware Workstation, Player, and ACE address several security issues
http://marc.info/?l=bugtraq&m=127557640302499&w=2 External Source HP SSRT100108
http://support.apple.com/kb/HT4435 External Source CONFIRM http://support.apple.com/kb/HT4435
http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/server/protocol.c?r1=917617&r2=917867&pathrev=917867&diff_format=h External Source CONFIRM http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/server/protocol.c?r1=917617&r2=917867&pathrev=917867&diff_format=h
http://svn.apache.org/viewvc?view=revision&revision=917867 External Source CONFIRM http://svn.apache.org/viewvc?view=revision&revision=917867
http://svn.apache.org/viewvc?view=revision&revision=918427 External Source CONFIRM http://svn.apache.org/viewvc?view=revision&revision=918427
http://www.debian.org/security/2010/dsa-2035 External Source DEBIAN DSA-2035
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html External Source CONFIRM http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
http://www.redhat.com/support/errata/RHSA-2010-0168.html External Source REDHAT RHSA-2010:0168
http://www.redhat.com/support/errata/RHSA-2010-0175.html External Source REDHAT RHSA-2010:0175
http://www.securityfocus.com/bid/38494 External Source BID 38494
http://www.vmware.com/security/advisories/VMSA-2010-0014.html External Source CONFIRM http://www.vmware.com/security/advisories/VMSA-2010-0014.html
http://www.vupen.com/english/advisories/2010/0911 External Source VUPEN ADV-2010-0911
http://www.vupen.com/english/advisories/2010/0994 External Source VUPEN ADV-2010-0994
http://www.vupen.com/english/advisories/2010/1001 External Source VUPEN ADV-2010-1001
http://www.vupen.com/english/advisories/2010/1057 External Source VUPEN ADV-2010-1057
http://www.vupen.com/english/advisories/2010/1411 External Source VUPEN ADV-2010-1411
http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939 External Source AIXAPAR PM08939
http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247 External Source AIXAPAR PM12247
http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 External Source AIXAPAR PM15829
https://bugzilla.redhat.com/show_bug.cgi?id=570171 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=570171
https://exchange.xforce.ibmcloud.com/vulnerabilities/56625 External Source XF apache-http-rh-info-disclosure(56625)
https://issues.apache.org/bugzilla/show_bug.cgi?id=48359 External Source CONFIRM https://issues.apache.org/bugzilla/show_bug.cgi?id=48359
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10358 External Source OVAL oval:org.mitre.oval:def:10358
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8695 External Source OVAL oval:org.mitre.oval:def:8695

References to Check Content

Identifier:
oval:org.mitre.oval:def:10358
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:10358
Identifier:
oval:org.mitre.oval:def:8695
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:8695

Technical Details

Vulnerability Type (View All)

  • Information Leak / Disclosure (CWE-200)

Change History 5 change records found - show changes