Description
The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2035-1 | New apache2 packages fix several issues |
EUVD |
EUVD-2010-0465 | The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request. |
Ubuntu USN |
USN-908-1 | Apache vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T00:52:18.802Z
Reserved: 2010-01-27T00:00:00.000Z
Link: CVE-2010-0434
No data.
Status : Deferred
Published: 2010-03-05T19:30:00.577
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-0434
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN