Description
protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2405-1 | apache2 security update |
Ubuntu USN |
USN-1368-1 | Apache HTTP Server vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Opensuse
Subscribe
Opensuse
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Workstation
Subscribe
Jboss Enterprise Web Server
Subscribe
Storage
Subscribe
Suse
Subscribe
Linux Enterprise Server
Subscribe
Linux Enterprise Software Development Kit
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T18:09:17.304Z
Reserved: 2011-12-07T00:00:00.000Z
Link: CVE-2012-0053
No data.
Status : Deferred
Published: 2012-01-28T04:05:00.797
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-0053
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN