First published: Wed Mar 03 2010(Updated: )
Quoting httpd 2.2 security page: <a href="http://httpd.apache.org/security/vulnerabilities_22.html#2.2.15">http://httpd.apache.org/security/vulnerabilities_22.html#2.2.15</a> low: Request header information leak <a href="https://access.redhat.com/security/cve/CVE-2010-0434">CVE-2010-0434</a> A bug in the handling of headers in subrequests could lead to a reuse of memory. In a multithreaded MPM this could possibly cause an information leak from other requests being handled by a different thread. Affects: 2.2.0 - 2.2.14 Upstream bug: <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=48359">https://issues.apache.org/bugzilla/show_bug.cgi?id=48359</a> Upstream commits (2.2.x branch): <a href="http://svn.apache.org/viewvc?view=revision&revision=917867">http://svn.apache.org/viewvc?view=revision&revision=917867</a> <a href="http://svn.apache.org/viewvc?view=revision&revision=918427">http://svn.apache.org/viewvc?view=revision&revision=918427</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | >=2.2.0<2.2.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-570171 is classified as low, indicating a minor security risk.
The affected versions of Apache HTTP Server range from 2.2.0 up to but not including 2.2.15.
To fix REDHAT-BUG-570171, upgrade the Apache HTTP Server to version 2.2.15 or later.
REDHAT-BUG-570171 identifies a request header information leak vulnerability.
Yes, REDHAT-BUG-570171 is associated with CVE-2010-0434.