Vulnerabilities > CVE-2010-0434 - Information Exposure vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Subverting Environment Variable Values
    The attacker directly or indirectly modifies environment variables used by or controlling the target software. The attacker's goal is to cause the target software to deviate from its expected operation in a manner that benefits the attacker.
  • Footprinting
    An attacker engages in probing and exploration activity to identify constituents and properties of the target. Footprinting is a general term to describe a variety of information gathering techniques, often used by attackers in preparation for some attack. It consists of using tools to learn as much as possible about the composition, configuration, and security mechanisms of the targeted application, system or network. Information that might be collected during a footprinting effort could include open ports, applications and their versions, network topology, and similar information. While footprinting is not intended to be damaging (although certain activities, such as network scans, can sometimes cause disruptions to vulnerable applications inadvertently) it may often pave the way for more damaging attacks.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Browser Fingerprinting
    An attacker carefully crafts small snippets of Java Script to efficiently detect the type of browser the potential victim is using. Many web-based attacks need prior knowledge of the web browser including the version of browser to ensure successful exploitation of a vulnerability. Having this knowledge allows an attacker to target the victim with attacks that specifically exploit known or zero day weaknesses in the type and version of the browser used by the victim. Automating this process via Java Script as a part of the same delivery system used to exploit the browser is considered more efficient as the attacker can supply a browser fingerprinting method and integrate it with exploit code, all contained in Java Script and in response to the same web page request by the browser.
  • Session Credential Falsification through Prediction
    This attack targets predictable session ID in order to gain privileges. The attacker can predict the session ID used during a transaction to perform spoofing and session hijacking.

Nessus

  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20100325_HTTPD_ON_SL4_X.NASL
    descriptionCVE-2010-0434 httpd: request header information leak A use-after-free flaw was discovered in the way the Apache HTTP Server handled request headers in subrequests. In configurations where subrequests are used, a multithreaded MPM (Multi-Processing Module) could possibly leak information from other requests in request replies. (CVE-2010-0434) This update also fixes the following bug : - a bug was found in the mod_dav module. If a PUT request for an existing file failed, that file would be unexpectedly deleted and a
    last seen2020-06-01
    modified2020-06-02
    plugin id60753
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60753
    titleScientific Linux Security Update : httpd on SL4.x i386/x86_64
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text is (C) Scientific Linux.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(60753);
      script_version("1.7");
      script_cvs_date("Date: 2019/10/25 13:36:18");
    
      script_cve_id("CVE-2010-0434");
    
      script_name(english:"Scientific Linux Security Update : httpd on SL4.x i386/x86_64");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Scientific Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "CVE-2010-0434 httpd: request header information leak
    
    A use-after-free flaw was discovered in the way the Apache HTTP Server
    handled request headers in subrequests. In configurations where
    subrequests are used, a multithreaded MPM (Multi-Processing Module)
    could possibly leak information from other requests in request
    replies. (CVE-2010-0434)
    
    This update also fixes the following bug :
    
      - a bug was found in the mod_dav module. If a PUT request
        for an existing file failed, that file would be
        unexpectedly deleted and a 'Could not get next bucket
        brigade' error logged. With this update, failed PUT
        requests no longer cause mod_dav to delete files, which
        resolves this issue. (BZ#572932)
    
    As well, this update adds the following enhancement :
    
      - with the updated openssl packages from RHSA-2010:0163
        installed, mod_ssl will refuse to renegotiate a TLS/SSL
        connection with an unpatched client that does not
        support RFC 5746. This update adds the
        'SSLInsecureRenegotiation' configuration directive. If
        this directive is enabled, mod_ssl will renegotiate
        insecurely with unpatched clients. (BZ#575805)
    
    Refer to the following Red Hat Knowledgebase article for more details
    about the changed mod_ssl behavior:
    http://kbase.redhat.com/faq/docs/DOC-20491
    
    After installing the updated packages, the httpd daemon must be
    restarted for the update to take effect."
      );
      # http://kbase.redhat.com/faq/docs/DOC-20491
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/articles/20490"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=572932"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=575805"
      );
      # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1003&L=scientific-linux-errata&T=0&P=2999
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?abc24617"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
      script_cwe_id(200);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2010/03/25");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/01");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Scientific Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SL4", reference:"httpd-2.0.52-41.sl4.7")) flag++;
    if (rpm_check(release:"SL4", reference:"httpd-devel-2.0.52-41.sl4.7")) flag++;
    if (rpm_check(release:"SL4", reference:"httpd-manual-2.0.52-41.sl4.7")) flag++;
    if (rpm_check(release:"SL4", reference:"httpd-suexec-2.0.52-41.sl4.7")) flag++;
    if (rpm_check(release:"SL4", reference:"mod_ssl-2.0.52-41.sl4.7")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2010-0168.NASL
    descriptionUpdated httpd packages that fix two security issues and add an enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The Apache HTTP Server is a popular web server. It was discovered that mod_proxy_ajp incorrectly returned an
    last seen2020-06-01
    modified2020-06-02
    plugin id45367
    published2010-03-29
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/45367
    titleCentOS 5 : httpd (CESA-2010:0168)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2010-0168.NASL
    descriptionFrom Red Hat Security Advisory 2010:0168 : Updated httpd packages that fix two security issues and add an enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The Apache HTTP Server is a popular web server. It was discovered that mod_proxy_ajp incorrectly returned an
    last seen2020-06-01
    modified2020-06-02
    plugin id68022
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68022
    titleOracle Linux 5 : httpd (ELSA-2010-0168)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_10_6_5.NASL
    descriptionThe remote host is running a version of Mac OS X 10.6.x that is prior to 10.6.5. Mac OS X 10.6.5 contains security fixes for the following products : - AFP Server - Apache mod_perl - Apache - AppKit - ATS - CFNetwork - CoreGraphics - CoreText - CUPS - Directory Services - diskdev_cmds - Disk Images - Flash Player plug-in - gzip - Image Capture - ImageIO - Image RAW - Kernel - MySQL - neon - Networking - OpenLDAP - OpenSSL - Password Server - PHP - Printing - python - QuickLook - QuickTime - Safari RSS - Time Machine - Wiki Server - X11 - xar
    last seen2020-06-01
    modified2020-06-02
    plugin id50548
    published2010-11-10
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/50548
    titleMac OS X 10.6.x < 10.6.5 Multiple Vulnerabilities
  • NASL familyWeb Servers
    NASL idAPACHE_2_2_15.NASL
    descriptionAccording to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.15. It is, therefore, potentially affected by multiple vulnerabilities : - A TLS renegotiation prefix injection attack is possible. (CVE-2009-3555) - The
    last seen2020-06-01
    modified2020-06-02
    plugin id45004
    published2010-10-20
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45004
    titleApache 2.2.x < 2.2.15 Multiple Vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_2_APACHE2-100413.NASL
    descriptionWhen using a multithreaded MPM apache could leak memory of requests handled by a different thread when processing subrequests (CVE-2010-0434). Specially crafted requests could crash mod_proxy_ajp (CVE-2010-0408).
    last seen2020-06-01
    modified2020-06-02
    plugin id46011
    published2010-04-27
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/46011
    titleopenSUSE Security Update : apache2 (openSUSE-SU-2010:0165-1)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201206-25.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201206-25 (Apache HTTP Server: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Apache HTTP Server. Please review the CVE identifiers referenced below for details. Impact : A remote attacker might obtain sensitive information, gain privileges, send requests to unintended servers behind proxies, bypass certain security restrictions, obtain the values of HTTPOnly cookies, or cause a Denial of Service in various ways. A local attacker could gain escalated privileges. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id59678
    published2012-06-25
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59678
    titleGLSA-201206-25 : Apache HTTP Server: Multiple vulnerabilities
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2035.NASL
    descriptionTwo issues have been found in the Apache HTTPD web server : - CVE-2010-0408 mod_proxy_ajp would return the wrong status code if it encountered an error, causing a backend server to be put into an error state until the retry timeout expired. A remote attacker could send malicious requests to trigger this issue, resulting in denial of service. - CVE-2010-0434 A flaw in the core subrequest process code was found, which could lead to a daemon crash (segfault) or disclosure of sensitive information if the headers of a subrequest were modified by modules such as mod_headers.
    last seen2020-06-01
    modified2020-06-02
    plugin id45557
    published2010-04-19
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/45557
    titleDebian DSA-2035-1 : apache2 - multiple issues
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2010-0175.NASL
    descriptionUpdated httpd packages that fix one security issue, a bug, and add an enhancement are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Apache HTTP Server is a popular web server. A use-after-free flaw was discovered in the way the Apache HTTP Server handled request headers in subrequests. In configurations where subrequests are used, a multithreaded MPM (Multi-Processing Module) could possibly leak information from other requests in request replies. (CVE-2010-0434) This update also fixes the following bug : * a bug was found in the mod_dav module. If a PUT request for an existing file failed, that file would be unexpectedly deleted and a
    last seen2020-06-01
    modified2020-06-02
    plugin id45368
    published2010-03-29
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/45368
    titleCentOS 4 : httpd (CESA-2010:0175)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2010-057.NASL
    descriptionA vulnerability has been found and corrected in apache : The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request (CVE-2010-0434). Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id44997
    published2010-03-08
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/44997
    titleMandriva Linux Security Advisory : apache (MDVSA-2010:057)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-5942.NASL
    descriptionThe Apache HTTP Server Project is proud to announce the release of version 2.2.15 of the Apache HTTP Server (
    last seen2020-06-01
    modified2020-06-02
    plugin id47408
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47408
    titleFedora 13 : httpd-2.2.15-1.fc13 (2010-5942)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2010-0175.NASL
    descriptionFrom Red Hat Security Advisory 2010:0175 : Updated httpd packages that fix one security issue, a bug, and add an enhancement are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Apache HTTP Server is a popular web server. A use-after-free flaw was discovered in the way the Apache HTTP Server handled request headers in subrequests. In configurations where subrequests are used, a multithreaded MPM (Multi-Processing Module) could possibly leak information from other requests in request replies. (CVE-2010-0434) This update also fixes the following bug : * a bug was found in the mod_dav module. If a PUT request for an existing file failed, that file would be unexpectedly deleted and a
    last seen2020-06-01
    modified2020-06-02
    plugin id68024
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68024
    titleOracle Linux 4 : httpd (ELSA-2010-0175)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-908-1.NASL
    descriptionIt was discovered that mod_proxy_ajp did not properly handle errors when a client doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id45037
    published2010-03-11
    reporterUbuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/45037
    titleUbuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : apache2 vulnerabilities (USN-908-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_1_APACHE2-100413.NASL
    descriptionWhen using a multithreaded MPM apache could leak memory of requests handled by a different thread when processing subrequests (CVE-2010-0434). Specially crafted requests could crash mod_proxy_ajp (CVE-2010-0408).
    last seen2020-06-01
    modified2020-06-02
    plugin id46009
    published2010-04-27
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/46009
    titleopenSUSE Security Update : apache2 (openSUSE-SU-2010:0165-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-6055.NASL
    descriptionThe Apache HTTP Server Project is proud to announce the release of version 2.2.15 of the Apache HTTP Server (
    last seen2020-06-01
    modified2020-06-02
    plugin id47412
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47412
    titleFedora 12 : httpd-2.2.15-1.fc12.2 (2010-6055)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_APACHE2-6984.NASL
    descriptionThe following bugs have been fixed : When using a multi-threaded MPM apache could leak memory of requests handled by a different thread when processing subrequests (CVE-2010-0434). Specially crafted requests could crash mod_proxy_ajp. (CVE-2010-0408)
    last seen2020-06-01
    modified2020-06-02
    plugin id46013
    published2010-04-27
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/46013
    titleSuSE 10 Security Update : Apache 2 (ZYPP Patch Number 6984)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-6131.NASL
    descriptionThe Apache HTTP Server Project is proud to announce the release of version 2.2.15 of the Apache HTTP Server (
    last seen2020-06-01
    modified2020-06-02
    plugin id47417
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47417
    titleFedora 11 : httpd-2.2.15-1.fc11.1 (2010-6131)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_APACHE2-6987.NASL
    descriptionThe following bugs have been fixed : When using a multi-threaded MPM apache could leak memory of requests handled by a different thread when processing subrequests (CVE-2010-0434). Specially crafted requests could crash mod_proxy_ajp. (CVE-2010-0408)
    last seen2020-06-01
    modified2020-06-02
    plugin id49827
    published2010-10-11
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/49827
    titleSuSE 10 Security Update : Apache 2 (ZYPP Patch Number 6987)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_APACHE2-100413.NASL
    descriptionThe following bugs have been fixed : - When using a multithreaded MPM Apache could leak memory of requests handled by a different thread when processing subrequests. (CVE-2010-0434) - Specially crafted requests could crash mod_proxy_ajp. (CVE-2010-0408)
    last seen2020-06-01
    modified2020-06-02
    plugin id50889
    published2010-12-02
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/50889
    titleSuSE 11 Security Update : Apache 2 (SAT Patch Number 2293)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2010-0175.NASL
    descriptionUpdated httpd packages that fix one security issue, a bug, and add an enhancement are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Apache HTTP Server is a popular web server. A use-after-free flaw was discovered in the way the Apache HTTP Server handled request headers in subrequests. In configurations where subrequests are used, a multithreaded MPM (Multi-Processing Module) could possibly leak information from other requests in request replies. (CVE-2010-0434) This update also fixes the following bug : * a bug was found in the mod_dav module. If a PUT request for an existing file failed, that file would be unexpectedly deleted and a
    last seen2020-06-01
    modified2020-06-02
    plugin id46281
    published2010-05-11
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/46281
    titleRHEL 4 : httpd (RHSA-2010:0175)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2010-0168.NASL
    descriptionUpdated httpd packages that fix two security issues and add an enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The Apache HTTP Server is a popular web server. It was discovered that mod_proxy_ajp incorrectly returned an
    last seen2020-06-01
    modified2020-06-02
    plugin id46279
    published2010-05-11
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/46279
    titleRHEL 5 : httpd (RHSA-2010:0168)
  • NASL familyWeb Servers
    NASL idORACLE_HTTP_SERVER_CPU_JUL_2013.NASL
    descriptionAccording to its banner, the version of Oracle HTTP Server installed on the remote host is potentially affected by multiple vulnerabilities. Note that Nessus did not verify if patches or workarounds have been applied.
    last seen2020-06-01
    modified2020-06-02
    plugin id69301
    published2013-08-11
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69301
    titleOracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20100325_HTTPD_ON_SL5_X.NASL
    descriptionCVE-2010-0408 httpd: mod_proxy_ajp remote temporary DoS CVE-2010-0434 httpd: request header information leak It was discovered that mod_proxy_ajp incorrectly returned an
    last seen2020-06-01
    modified2020-06-02
    plugin id60754
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60754
    titleScientific Linux Security Update : httpd on SL5.x i386/x86_64
  • NASL familyWeb Servers
    NASL idAPACHE_2_0_64.NASL
    descriptionAccording to its banner, the version of Apache 2.0.x running on the remote host is prior to 2.0.64. It is, therefore, affected by the following vulnerabilities : - An unspecified error exists in the handling of requests without a path segment. (CVE-2010-1452) - Several modules, including
    last seen2020-06-01
    modified2020-06-02
    plugin id50069
    published2010-10-20
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/50069
    titleApache 2.0.x < 2.0.64 Multiple Vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_0_APACHE2-100413.NASL
    descriptionWhen using a multithreaded MPM apache could leak memory of requests handled by a different thread when processing subrequests (CVE-2010-0434). Specially crafted requests could crash mod_proxy_ajp (CVE-2010-0408).
    last seen2020-06-01
    modified2020-06-02
    plugin id46006
    published2010-04-27
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/46006
    titleopenSUSE Security Update : apache2 (openSUSE-SU-2010:0165-1)

Oval

  • accepted2013-04-29T04:04:57.872-04:00
    classvulnerability
    contributors
    • nameAharon Chernin
      organizationSCAP.com, LLC
    • nameDragos Prisaca
      organizationG2, Inc.
    definition_extensions
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
      ovaloval:org.mitre.oval:def:11831
    • commentCentOS Linux 4.x
      ovaloval:org.mitre.oval:def:16636
    • commentOracle Linux 4.x
      ovaloval:org.mitre.oval:def:15990
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
      ovaloval:org.mitre.oval:def:11414
    • commentThe operating system installed on the system is CentOS Linux 5.x
      ovaloval:org.mitre.oval:def:15802
    • commentOracle Linux 5.x
      ovaloval:org.mitre.oval:def:15459
    descriptionThe ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
    familyunix
    idoval:org.mitre.oval:def:10358
    statusaccepted
    submitted2010-07-09T03:56:16-04:00
    titleThe ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
    version27
  • accepted2014-07-14T04:01:31.358-04:00
    classvulnerability
    contributors
    • nameJ. Daniel Brown
      organizationDTCC
    • nameMike Lah
      organizationThe MITRE Corporation
    • nameShane Shaffer
      organizationG2, Inc.
    • nameMaria Mikhno
      organizationALTX-SOFT
    definition_extensions
    commentApache HTTP Server 2.2.x is installed on the system
    ovaloval:org.mitre.oval:def:8550
    descriptionThe ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
    familywindows
    idoval:org.mitre.oval:def:8695
    statusaccepted
    submitted2010-03-04T17:30:00.000-05:00
    titleApache HTTP Server request header information disclosure
    version11

Redhat

advisories
  • bugzilla
    id570171
    titleCVE-2010-0434 httpd: request header information leak
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commenthttpd is earlier than 0:2.2.3-31.el5_4.4
            ovaloval:com.redhat.rhsa:tst:20100168001
          • commenthttpd is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070556002
        • AND
          • commenthttpd-devel is earlier than 0:2.2.3-31.el5_4.4
            ovaloval:com.redhat.rhsa:tst:20100168003
          • commenthttpd-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070556006
        • AND
          • commentmod_ssl is earlier than 1:2.2.3-31.el5_4.4
            ovaloval:com.redhat.rhsa:tst:20100168005
          • commentmod_ssl is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070556008
        • AND
          • commenthttpd-manual is earlier than 0:2.2.3-31.el5_4.4
            ovaloval:com.redhat.rhsa:tst:20100168007
          • commenthttpd-manual is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070556004
    rhsa
    idRHSA-2010:0168
    released2010-03-25
    severityModerate
    titleRHSA-2010:0168: httpd security and enhancement update (Moderate)
  • bugzilla
    id575805
    titlemod_ssl: Add SSLInsecureRenegotiation directive [rhel-4]
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 4 is installed
        ovaloval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • commentmod_ssl is earlier than 1:2.0.52-41.ent.7
            ovaloval:com.redhat.rhsa:tst:20100175001
          • commentmod_ssl is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060159010
        • AND
          • commenthttpd is earlier than 0:2.0.52-41.ent.7
            ovaloval:com.redhat.rhsa:tst:20100175003
          • commenthttpd is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060159006
        • AND
          • commenthttpd-manual is earlier than 0:2.0.52-41.ent.7
            ovaloval:com.redhat.rhsa:tst:20100175005
          • commenthttpd-manual is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060159004
        • AND
          • commenthttpd-devel is earlier than 0:2.0.52-41.ent.7
            ovaloval:com.redhat.rhsa:tst:20100175007
          • commenthttpd-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060159008
        • AND
          • commenthttpd-suexec is earlier than 0:2.0.52-41.ent.7
            ovaloval:com.redhat.rhsa:tst:20100175009
          • commenthttpd-suexec is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060159002
    rhsa
    idRHSA-2010:0175
    released2010-03-25
    severityLow
    titleRHSA-2010:0175: httpd security, bug fix, and enhancement update (Low)
rpms
  • httpd-0:2.2.3-31.el5_4.4
  • httpd-debuginfo-0:2.2.3-31.el5_4.4
  • httpd-devel-0:2.2.3-31.el5_4.4
  • httpd-manual-0:2.2.3-31.el5_4.4
  • mod_ssl-1:2.2.3-31.el5_4.4
  • httpd-0:2.0.52-41.ent.7
  • httpd-debuginfo-0:2.0.52-41.ent.7
  • httpd-devel-0:2.0.52-41.ent.7
  • httpd-manual-0:2.0.52-41.ent.7
  • httpd-suexec-0:2.0.52-41.ent.7
  • mod_ssl-1:2.0.52-41.ent.7
  • httpd-0:2.2.14-1.2.6.jdk6.ep5.el5
  • httpd-debuginfo-0:2.2.14-1.2.6.jdk6.ep5.el5
  • httpd-devel-0:2.2.14-1.2.6.jdk6.ep5.el5
  • httpd-manual-0:2.2.14-1.2.6.jdk6.ep5.el5
  • httpd22-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-apr-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-apr-devel-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-apr-util-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-apr-util-devel-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-debuginfo-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-devel-0:2.2.14-11.jdk6.ep5.el4
  • httpd22-manual-0:2.2.14-11.jdk6.ep5.el4
  • mod_ssl-1:2.2.14-1.2.6.jdk6.ep5.el5
  • mod_ssl22-1:2.2.14-11.jdk6.ep5.el4
  • ant-0:1.6.5-1jpp_1rh
  • avalon-logkit-0:1.2-2jpp_4rh
  • axis-0:1.2.1-1jpp_3rh
  • classpathx-jaf-0:1.0-2jpp_6rh
  • classpathx-mail-0:1.1.1-2jpp_8rh
  • geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh
  • geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-specs-0:1.0-0.M4.1jpp_10rh
  • geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh
  • jakarta-commons-modeler-0:2.0-3jpp_2rh
  • log4j-0:1.2.12-1jpp_1rh
  • mx4j-1:3.0.1-1jpp_4rh
  • pcsc-lite-0:1.3.3-3.el4
  • pcsc-lite-debuginfo-0:1.3.3-3.el4
  • pcsc-lite-doc-0:1.3.3-3.el4
  • pcsc-lite-libs-0:1.3.3-3.el4
  • rhpki-ca-0:7.3.0-20.el4
  • rhpki-java-tools-0:7.3.0-10.el4
  • rhpki-kra-0:7.3.0-14.el4
  • rhpki-manage-0:7.3.0-19.el4
  • rhpki-native-tools-0:7.3.0-6.el4
  • rhpki-ocsp-0:7.3.0-13.el4
  • rhpki-tks-0:7.3.0-13.el4
  • tomcat5-0:5.5.23-0jpp_4rh.16
  • tomcat5-common-lib-0:5.5.23-0jpp_4rh.16
  • tomcat5-jasper-0:5.5.23-0jpp_4rh.16
  • tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16
  • tomcat5-server-lib-0:5.5.23-0jpp_4rh.16
  • tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16
  • xerces-j2-0:2.7.1-1jpp_1rh
  • xml-commons-0:1.3.02-2jpp_1rh
  • xml-commons-apis-0:1.3.02-2jpp_1rh

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 38580 CVE(CAN) ID: CVE-2010-0434 Apache HTTP Server是一款流行的Web服务器。 在使用多线程MPM时,Apache HTTP Server的server/protocol.c文件中的ap_read_request函数没有正确地处理子请求,可能允许远程攻击者从其他线程所处理的请求中读取敏感信息。 Apache Group Apache 2.2.x 厂商补丁: Apache Group ------------ 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://svn.apache.org/viewvc?view=revision&amp;revision=918427 http://svn.apache.org/viewvc?view=revision&amp;revision=917867
idSSV:19320
last seen2017-11-19
modified2010-03-23
published2010-03-23
reporterRoot
titleApache 2.2.x子请求处理信息泄露漏洞

Statements

contributorVincent Danen
lastmodified2010-04-13
organizationRed Hat
statementRed Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0434 This issue was fixed in Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2010-0168.html This issue was fixed in Red Hat Enterprise Linux 4 via: https://rhn.redhat.com/errata/RHSA-2010-0175.html The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw on Red Hat Enterprise Linux 3. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/

References