Rapid7 Vulnerability & Exploit Database

Apache HTTPD: Timeout detection flaw (mod_proxy_http) (CVE-2010-2068)

Back to Search

Apache HTTPD: Timeout detection flaw (mod_proxy_http) (CVE-2010-2068)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
06/18/2010
Created
07/25/2018
Added
04/12/2012
Modified
04/17/2018

Description

The affected asset is vulnerable to this vulnerability ONLY if it is running one of the following modules: mod_proxy_http. Review your web server configuration for validation. An information disclosure flaw was found in mod_proxy_http in versions 2.2.9 through 2.2.15, 2.3.4-alpha and 2.3.5-alpha. Under certain timeout conditions, the server could return a response intended for another user. Only Windows, Netware and OS2 operating systems are affected. Only those configurations which trigger the use of proxy worker pools are affected. There was no vulnerability on earlier versions, as proxy pools were not yet introduced. The simplest workaround is to globally configure; SetEnv proxy-nokeepalive 1 Source code patches are at; 2.2.15: CVE-2010-2068-r953616.patch 2.3.5: CVE-2010-2068-r953418.patch Binary replacement modules are at mod_proxy_http-CVE-2010-2068.zip

Solution(s)

  • apache-httpd-cve-2010-2068-2-3-patch
  • apache-httpd-upgrade-2_2_16

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;