Vulnerabilities > CVE-2010-0408 - Unspecified vulnerability in Apache Http Server

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
apache
nessus

Summary

The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.

Nessus

  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2010-0168.NASL
    descriptionUpdated httpd packages that fix two security issues and add an enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The Apache HTTP Server is a popular web server. It was discovered that mod_proxy_ajp incorrectly returned an
    last seen2020-06-01
    modified2020-06-02
    plugin id45367
    published2010-03-29
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/45367
    titleCentOS 5 : httpd (CESA-2010:0168)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2010-0168.NASL
    descriptionFrom Red Hat Security Advisory 2010:0168 : Updated httpd packages that fix two security issues and add an enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The Apache HTTP Server is a popular web server. It was discovered that mod_proxy_ajp incorrectly returned an
    last seen2020-06-01
    modified2020-06-02
    plugin id68022
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68022
    titleOracle Linux 5 : httpd (ELSA-2010-0168)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_10_6_5.NASL
    descriptionThe remote host is running a version of Mac OS X 10.6.x that is prior to 10.6.5. Mac OS X 10.6.5 contains security fixes for the following products : - AFP Server - Apache mod_perl - Apache - AppKit - ATS - CFNetwork - CoreGraphics - CoreText - CUPS - Directory Services - diskdev_cmds - Disk Images - Flash Player plug-in - gzip - Image Capture - ImageIO - Image RAW - Kernel - MySQL - neon - Networking - OpenLDAP - OpenSSL - Password Server - PHP - Printing - python - QuickLook - QuickTime - Safari RSS - Time Machine - Wiki Server - X11 - xar
    last seen2020-06-01
    modified2020-06-02
    plugin id50548
    published2010-11-10
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/50548
    titleMac OS X 10.6.x < 10.6.5 Multiple Vulnerabilities
  • NASL familyWeb Servers
    NASL idAPACHE_2_2_15.NASL
    descriptionAccording to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.15. It is, therefore, potentially affected by multiple vulnerabilities : - A TLS renegotiation prefix injection attack is possible. (CVE-2009-3555) - The
    last seen2020-06-01
    modified2020-06-02
    plugin id45004
    published2010-10-20
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45004
    titleApache 2.2.x < 2.2.15 Multiple Vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_2_APACHE2-100413.NASL
    descriptionWhen using a multithreaded MPM apache could leak memory of requests handled by a different thread when processing subrequests (CVE-2010-0434). Specially crafted requests could crash mod_proxy_ajp (CVE-2010-0408).
    last seen2020-06-01
    modified2020-06-02
    plugin id46011
    published2010-04-27
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/46011
    titleopenSUSE Security Update : apache2 (openSUSE-SU-2010:0165-1)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201206-25.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201206-25 (Apache HTTP Server: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Apache HTTP Server. Please review the CVE identifiers referenced below for details. Impact : A remote attacker might obtain sensitive information, gain privileges, send requests to unintended servers behind proxies, bypass certain security restrictions, obtain the values of HTTPOnly cookies, or cause a Denial of Service in various ways. A local attacker could gain escalated privileges. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id59678
    published2012-06-25
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59678
    titleGLSA-201206-25 : Apache HTTP Server: Multiple vulnerabilities
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2035.NASL
    descriptionTwo issues have been found in the Apache HTTPD web server : - CVE-2010-0408 mod_proxy_ajp would return the wrong status code if it encountered an error, causing a backend server to be put into an error state until the retry timeout expired. A remote attacker could send malicious requests to trigger this issue, resulting in denial of service. - CVE-2010-0434 A flaw in the core subrequest process code was found, which could lead to a daemon crash (segfault) or disclosure of sensitive information if the headers of a subrequest were modified by modules such as mod_headers.
    last seen2020-06-01
    modified2020-06-02
    plugin id45557
    published2010-04-19
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/45557
    titleDebian DSA-2035-1 : apache2 - multiple issues
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-5942.NASL
    descriptionThe Apache HTTP Server Project is proud to announce the release of version 2.2.15 of the Apache HTTP Server (
    last seen2020-06-01
    modified2020-06-02
    plugin id47408
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47408
    titleFedora 13 : httpd-2.2.15-1.fc13 (2010-5942)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-908-1.NASL
    descriptionIt was discovered that mod_proxy_ajp did not properly handle errors when a client doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id45037
    published2010-03-11
    reporterUbuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/45037
    titleUbuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : apache2 vulnerabilities (USN-908-1)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2010-067-01.NASL
    descriptionNew httpd packages are available for Slackware 12.0, 12.1, 12.2, 13.0, and -current to fix security issues. mod_ssl: A partial fix for the TLS renegotiation prefix injection attack by rejecting any client-initiated renegotiations. mod_proxy_ajp: Respond with HTTP_BAD_REQUEST when the body is not sent when request headers indicate a request body is incoming; not a case of HTTP_INTERNAL_SERVER_ERROR. mod_isapi: Do not unload an isapi .dll module until the request processing is completed, avoiding orphaned callback pointers. [This is the most serious flaw, but does not affect Linux systems]
    last seen2020-06-01
    modified2020-06-02
    plugin id45007
    published2010-03-09
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45007
    titleSlackware 12.0 / 12.1 / 12.2 / 13.0 / current : httpd (SSA:2010-067-01)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_1_APACHE2-100413.NASL
    descriptionWhen using a multithreaded MPM apache could leak memory of requests handled by a different thread when processing subrequests (CVE-2010-0434). Specially crafted requests could crash mod_proxy_ajp (CVE-2010-0408).
    last seen2020-06-01
    modified2020-06-02
    plugin id46009
    published2010-04-27
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/46009
    titleopenSUSE Security Update : apache2 (openSUSE-SU-2010:0165-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-6055.NASL
    descriptionThe Apache HTTP Server Project is proud to announce the release of version 2.2.15 of the Apache HTTP Server (
    last seen2020-06-01
    modified2020-06-02
    plugin id47412
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47412
    titleFedora 12 : httpd-2.2.15-1.fc12.2 (2010-6055)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_APACHE2-6984.NASL
    descriptionThe following bugs have been fixed : When using a multi-threaded MPM apache could leak memory of requests handled by a different thread when processing subrequests (CVE-2010-0434). Specially crafted requests could crash mod_proxy_ajp. (CVE-2010-0408)
    last seen2020-06-01
    modified2020-06-02
    plugin id46013
    published2010-04-27
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/46013
    titleSuSE 10 Security Update : Apache 2 (ZYPP Patch Number 6984)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-6131.NASL
    descriptionThe Apache HTTP Server Project is proud to announce the release of version 2.2.15 of the Apache HTTP Server (
    last seen2020-06-01
    modified2020-06-02
    plugin id47417
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47417
    titleFedora 11 : httpd-2.2.15-1.fc11.1 (2010-6131)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_APACHE2-6987.NASL
    descriptionThe following bugs have been fixed : When using a multi-threaded MPM apache could leak memory of requests handled by a different thread when processing subrequests (CVE-2010-0434). Specially crafted requests could crash mod_proxy_ajp. (CVE-2010-0408)
    last seen2020-06-01
    modified2020-06-02
    plugin id49827
    published2010-10-11
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/49827
    titleSuSE 10 Security Update : Apache 2 (ZYPP Patch Number 6987)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_APACHE2-100413.NASL
    descriptionThe following bugs have been fixed : - When using a multithreaded MPM Apache could leak memory of requests handled by a different thread when processing subrequests. (CVE-2010-0434) - Specially crafted requests could crash mod_proxy_ajp. (CVE-2010-0408)
    last seen2020-06-01
    modified2020-06-02
    plugin id50889
    published2010-12-02
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/50889
    titleSuSE 11 Security Update : Apache 2 (SAT Patch Number 2293)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2010-0168.NASL
    descriptionUpdated httpd packages that fix two security issues and add an enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The Apache HTTP Server is a popular web server. It was discovered that mod_proxy_ajp incorrectly returned an
    last seen2020-06-01
    modified2020-06-02
    plugin id46279
    published2010-05-11
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/46279
    titleRHEL 5 : httpd (RHSA-2010:0168)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20100325_HTTPD_ON_SL5_X.NASL
    descriptionCVE-2010-0408 httpd: mod_proxy_ajp remote temporary DoS CVE-2010-0434 httpd: request header information leak It was discovered that mod_proxy_ajp incorrectly returned an
    last seen2020-06-01
    modified2020-06-02
    plugin id60754
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60754
    titleScientific Linux Security Update : httpd on SL5.x i386/x86_64
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_0_APACHE2-100413.NASL
    descriptionWhen using a multithreaded MPM apache could leak memory of requests handled by a different thread when processing subrequests (CVE-2010-0434). Specially crafted requests could crash mod_proxy_ajp (CVE-2010-0408).
    last seen2020-06-01
    modified2020-06-02
    plugin id46006
    published2010-04-27
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/46006
    titleopenSUSE Security Update : apache2 (openSUSE-SU-2010:0165-1)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2010-053.NASL
    descriptionA vulnerability has been found and corrected in apache : mod_proxy_ajp: Respond with HTTP_BAD_REQUEST when the body is not sent after request headers indicate a request body is incoming; this is not a case of HTTP_INTERNAL_SERVER_ERROR (CVE-2010-0408). Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id44963
    published2010-03-03
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/44963
    titleMandriva Linux Security Advisory : apache (MDVSA-2010:053)

Oval

  • accepted2014-07-14T04:01:30.549-04:00
    classvulnerability
    contributors
    • nameJ. Daniel Brown
      organizationDTCC
    • nameMike Lah
      organizationThe MITRE Corporation
    • nameShane Shaffer
      organizationG2, Inc.
    • nameMaria Mikhno
      organizationALTX-SOFT
    definition_extensions
    commentApache HTTP Server 2.2.x is installed on the system
    ovaloval:org.mitre.oval:def:8550
    descriptionThe ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
    familywindows
    idoval:org.mitre.oval:def:8619
    statusaccepted
    submitted2010-03-08T17:30:00.000-05:00
    titleApache mod_proxy_ajp Module Incoming Request Body Denial Of Service Vulnerability
    version11
  • accepted2013-04-29T04:23:26.979-04:00
    classvulnerability
    contributors
    • nameAharon Chernin
      organizationSCAP.com, LLC
    • nameDragos Prisaca
      organizationG2, Inc.
    definition_extensions
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
      ovaloval:org.mitre.oval:def:11414
    • commentThe operating system installed on the system is CentOS Linux 5.x
      ovaloval:org.mitre.oval:def:15802
    • commentOracle Linux 5.x
      ovaloval:org.mitre.oval:def:15459
    descriptionThe ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
    familyunix
    idoval:org.mitre.oval:def:9935
    statusaccepted
    submitted2010-07-09T03:56:16-04:00
    titleThe ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
    version18

Redhat

advisories
rhsa
idRHSA-2010:0168
rpms
  • httpd-0:2.2.3-31.el5_4.4
  • httpd-debuginfo-0:2.2.3-31.el5_4.4
  • httpd-devel-0:2.2.3-31.el5_4.4
  • httpd-manual-0:2.2.3-31.el5_4.4
  • mod_ssl-1:2.2.3-31.el5_4.4
  • httpd-0:2.2.14-1.2.6.jdk6.ep5.el5
  • httpd-debuginfo-0:2.2.14-1.2.6.jdk6.ep5.el5
  • httpd-devel-0:2.2.14-1.2.6.jdk6.ep5.el5
  • httpd-manual-0:2.2.14-1.2.6.jdk6.ep5.el5
  • httpd22-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-apr-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-apr-devel-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-apr-util-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-apr-util-devel-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-debuginfo-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-devel-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-manual-0:2.2.14-11.jdk6.ep5.el4
  • mod_ssl-1:2.2.14-1.2.6.jdk6.ep5.el5
  • mod_ssl22-1:2.2.14-11.jdk6.ep5.el4

References