Rapid7 Vulnerability & Exploit Database

Apache HTTPD: Subrequest handling of request headers (mod_headers) (CVE-2010-0434)

Back to Search

Apache HTTPD: Subrequest handling of request headers (mod_headers) (CVE-2010-0434)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
03/05/2010
Created
07/25/2018
Added
04/12/2012
Modified
01/30/2020

Description

The affected asset is vulnerable to this vulnerability ONLY if it is running one of the following modules: mod_headers. Review your web server configuration for validation. A flaw in the core subrequest process code was fixed, to always provide a shallow copy of the headers_in array to the subrequest, instead of a pointer to the parent request's array as it had for requests without request bodies. This meant all modules such as mod_headers which may manipulate the input headers for a subrequest would poison the parent request in two ways, one by modifying the parent request, which might not be intended, and second by leaving pointers to modified header fields in memory allocated to the subrequest scope, which could be freed before the main request processing was finished, resulting in a segfault or in revealing data from another request on threaded servers, such as the worker or winnt MPMs.

Solution(s)

  • apache-httpd-upgrade-2_0_64
  • apache-httpd-upgrade-2_2_15

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;