CVE-2010-0434 Information

Share on:

Description

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15 when a multithreaded MPM is used does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

Reference

http://httpd.apache.org/security/vulnerabilities_22.html http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html http://lists.vmware.com/pipermail/security-announce/2010/000105.html http://marc.info/?l=bugtraq&m=127557640302499&w=2 http://secunia.com/advisories/39100 http://secunia.com/advisories/39115 http://secunia.com/advisories/39501 http://secunia.com/advisories/39628 http://secunia.com/advisories/39632 http://secunia.com/advisories/39656 http://secunia.com/advisories/40096 http://support.apple.com/kb/HT4435 http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/server/protocol.c?r1=917617&r2=917867&pathrev=917867&diff_format=h http://svn.apache.org/viewvc?view=revision&revision=917867 http://svn.apache.org/viewvc?view=revision&revision=918427 http://www.debian.org/security/2010/dsa-2035 http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html http://www.redhat.com/support/errata/RHSA-2010-0168.html http://www.redhat.com/support/errata/RHSA-2010-0175.html http://www.securityfocus.com/bid/38494 http://www.vmware.com/security/advisories/VMSA-2010-0014.html http://www.vupen.com/english/advisories/2010/0911 http://www.vupen.com/english/advisories/2010/0994 http://www.vupen.com/english/advisories/2010/1001 http://www.vupen.com/english/advisories/2010/1057 http://www.vupen.com/english/advisories/2010/1411 http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939 http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247 http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 https://bugzilla.redhat.com/show_bug.cgi?id=570171 https://exchange.xforce.ibmcloud.com/vulnerabilities/56625 https://issues.apache.org/bugzilla/show_bug.cgi?id=48359 https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@3Ccvs.httpd.apache.org3E https://oval.cisecurity.org/repository/search/definition/oval3Aorg.mitre.oval3Adef3A10358 https://oval.cisecurity.org/repository/search/definition/oval3Aorg.mitre.oval3Adef3A8695