CVE-2010-0434

Description

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

Category

4.3
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 2.55% Top 20%
Vendor Advisory redhat.com Vendor Advisory ibm.com Vendor Advisory fedoraproject.org Vendor Advisory marc.info Vendor Advisory ibm.com Vendor Advisory redhat.com Vendor Advisory apple.com Vendor Advisory opensuse.org Vendor Advisory debian.org Vendor Advisory ibm.com Vendor Advisory fedoraproject.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.redhat.com/support/errata/RHSA-2010-0175.html third party advisory vendor advisory
http://secunia.com/advisories/39115 third party advisory not applicable
http://www.vupen.com/english/advisories/2010/1411 vdb entry permissions required
http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/server/protocol.c?r1=917617&r2=917867&pathrev=917867&diff_format=h patch vendor advisory
http://www.vmware.com/security/advisories/VMSA-2010-0014.html third party advisory
http://www.vupen.com/english/advisories/2010/0911 vdb entry permissions required
http://secunia.com/advisories/39628 third party advisory not applicable
http://support.apple.com/kb/HT4435 broken link
http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247 third party advisory vendor advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html mailing list third party advisory vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10358 vdb entry third party advisory signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8695 vdb entry third party advisory signature
http://marc.info/?l=bugtraq&m=127557640302499&w=2 issue tracking mailing list third party advisory vendor advisory
http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 third party advisory vendor advisory
http://secunia.com/advisories/39656 third party advisory not applicable
https://issues.apache.org/bugzilla/show_bug.cgi?id=48359 issue tracking vendor advisory
http://www.securityfocus.com/bid/38494 vdb entry third party advisory
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html third party advisory
http://www.redhat.com/support/errata/RHSA-2010-0168.html third party advisory vendor advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/56625 vdb entry third party advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html mailing list broken link vendor advisory
http://secunia.com/advisories/39100 third party advisory not applicable
http://secunia.com/advisories/39501 third party advisory not applicable
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html mailing list third party advisory vendor advisory
http://lists.vmware.com/pipermail/security-announce/2010/000105.html third party advisory mailing list
http://httpd.apache.org/security/vulnerabilities_22.html patch vendor advisory
http://svn.apache.org/viewvc?view=revision&revision=917867 patch vendor advisory
http://secunia.com/advisories/40096 third party advisory not applicable
https://bugzilla.redhat.com/show_bug.cgi?id=570171 issue tracking third party advisory
http://secunia.com/advisories/39632 third party advisory not applicable
http://www.debian.org/security/2010/dsa-2035 third party advisory vendor advisory
http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939 third party advisory vendor advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html mailing list third party advisory vendor advisory
http://svn.apache.org/viewvc?view=revision&revision=918427 patch vendor advisory
http://www.vupen.com/english/advisories/2010/1001 vdb entry permissions required
http://www.vupen.com/english/advisories/2010/0994 vdb entry permissions required
http://www.vupen.com/english/advisories/2010/1057 vdb entry permissions required
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E mailing list
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E mailing list

Frequently Asked Questions

What is the severity of CVE-2010-0434?
CVE-2010-0434 has been scored as a medium severity vulnerability.
How to fix CVE-2010-0434?
To fix CVE-2010-0434, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2010-0434 being actively exploited in the wild?
It is possible that CVE-2010-0434 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~3% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.