First published: Thu Aug 05 2010(Updated: )
mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | =2.2.9 | |
UNIX UNIX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2791 is considered a medium severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2010-2791, upgrade the Apache HTTP Server to version 2.2.10 or later.
CVE-2010-2791 affects Apache HTTP Server version 2.2.9 when running on Unix.
Yes, CVE-2010-2791 can be exploited remotely by attackers to retrieve sensitive information.
CVE-2010-2791 involves an issue where mod_proxy does not close the backend connection after a timeout occurs, leading to possible information leakage.