First published: Wed Dec 09 2009(Updated: )
The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd22 | <0:2.2.14-11.jdk6.ep5.el4 | 0:2.2.14-11.jdk6.ep5.el4 |
redhat/pcsc-lite | <0:1.3.3-3.el4 | 0:1.3.3-3.el4 |
redhat/rhpki-ca | <0:7.3.0-20.el4 | 0:7.3.0-20.el4 |
redhat/rhpki-java-tools | <0:7.3.0-10.el4 | 0:7.3.0-10.el4 |
redhat/rhpki-kra | <0:7.3.0-14.el4 | 0:7.3.0-14.el4 |
redhat/rhpki-manage | <0:7.3.0-19.el4 | 0:7.3.0-19.el4 |
redhat/rhpki-native-tools | <0:7.3.0-6.el4 | 0:7.3.0-6.el4 |
redhat/rhpki-ocsp | <0:7.3.0-13.el4 | 0:7.3.0-13.el4 |
redhat/rhpki-tks | <0:7.3.0-13.el4 | 0:7.3.0-13.el4 |
redhat/httpd | <0:2.2.3-31.el5_4.4 | 0:2.2.3-31.el5_4.4 |
redhat/httpd | <0:2.2.14-1.2.6.jdk6.ep5.el5 | 0:2.2.14-1.2.6.jdk6.ep5.el5 |
Apache HTTP Server | >=2.0.35<2.0.64 | |
Apache HTTP Server | >=2.2.0<2.2.15 | |
Fedora | =11 | |
Fedora | =13 | |
Debian | =5.0 | |
Debian | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)