CVE-2010-0408 Information

Share on:

Description

The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body which allows remote attackers to cause a denial of service (backend server outage) via a crafted request related to use of a 500 error code instead of the appropriate 400 error code.

Reference

http://httpd.apache.org/security/vulnerabilities_22.html http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html http://marc.info/?l=bugtraq&m=127557640302499&w=2 http://secunia.com/advisories/39100 http://secunia.com/advisories/39501 http://secunia.com/advisories/39628 http://secunia.com/advisories/39632 http://secunia.com/advisories/39656 http://secunia.com/advisories/40096 http://support.apple.com/kb/HT4435 http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/modules/proxy/mod_proxy_ajp.c?r1=917876&r2=917875&pathrev=917876 http://svn.apache.org/viewvc?view=revision&revision=917876 http://www.debian.org/security/2010/dsa-2035 http://www.mandriva.com/security/advisories?name=MDVSA-2010:053 http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html http://www.redhat.com/support/errata/RHSA-2010-0168.html http://www.securityfocus.com/bid/38491 http://www.vupen.com/english/advisories/2010/0911 http://www.vupen.com/english/advisories/2010/0994 http://www.vupen.com/english/advisories/2010/1001 http://www.vupen.com/english/advisories/2010/1057 http://www.vupen.com/english/advisories/2010/1411 http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939 http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247 http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 https://bugzilla.redhat.com/show_bug.cgi?id=569905 https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@3Ccvs.httpd.apache.org3E https://oval.cisecurity.org/repository/search/definition/oval3Aorg.mitre.oval3Adef3A8619 https://oval.cisecurity.org/repository/search/definition/oval3Aorg.mitre.oval3Adef3A9935