The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

Project Subscriptions

Vendors Products
Http Server Subscribe
Debian Linux Subscribe
Fedoraproject Subscribe
Certificate System Subscribe
Enterprise Linux Subscribe
Jboss Enterprise Web Server Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2035-1 New apache2 packages fix several issues
EUVD EUVD EUVD-2010-0465 The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
Ubuntu USN Ubuntu USN USN-908-1 Apache vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://httpd.apache.org/security/vulnerabilities_22.html cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html cve-icon cve-icon
http://lists.vmware.com/pipermail/security-announce/2010/000105.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=127557640302499&w=2 cve-icon cve-icon
http://secunia.com/advisories/39100 cve-icon cve-icon
http://secunia.com/advisories/39115 cve-icon cve-icon
http://secunia.com/advisories/39501 cve-icon cve-icon
http://secunia.com/advisories/39628 cve-icon cve-icon
http://secunia.com/advisories/39632 cve-icon cve-icon
http://secunia.com/advisories/39656 cve-icon cve-icon
http://secunia.com/advisories/40096 cve-icon cve-icon
http://support.apple.com/kb/HT4435 cve-icon cve-icon
http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/server/protocol.c?r1=917617&r2=917867&pathrev=917867&diff_format=h cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=917867 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=918427 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 cve-icon cve-icon
http://www.debian.org/security/2010/dsa-2035 cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0168.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0175.html cve-icon cve-icon
http://www.securityfocus.com/bid/38494 cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2010-0014.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/0911 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/0994 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1001 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1057 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1411 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=570171 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/56625 cve-icon cve-icon
https://issues.apache.org/bugzilla/show_bug.cgi?id=48359 cve-icon cve-icon
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2010-0434 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10358 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8695 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2010-0434 cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T00:52:18.802Z

Reserved: 2010-01-27T00:00:00.000Z

Link: CVE-2010-0434

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2010-03-05T19:30:00.577

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-0434

cve-icon Redhat

Severity : Low

Publid Date: 2009-12-09T00:00:00Z

Links: CVE-2010-0434 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses