10

CVE-2010-0425

Exploit

modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."

Data is provided by the National Vulnerability Database (NVD)
IbmWebsphere Application Server SwPlatformz/os Version >= 6.1 < 6.1.0.31
ApacheHTTP Server Version >= 2.0.37 < 2.0.64
   MicrosoftWindows Version-
ApacheHTTP Server Version >= 2.2.0 < 2.2.15
   MicrosoftWindows Version-
ApacheHTTP Server Version >= 2.3.0 < 2.3.7
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.1
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.3
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.7
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.9
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.11
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.13
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.15
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.19
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.21
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.23
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.25
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.27
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.29
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.31
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.33
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.35
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.37
   MicrosoftWindows Version-
IbmHTTP Server Version6.0.2.39
   MicrosoftWindows Version-
IbmHTTP Server Version6.1
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.2
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.3
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.5
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.7
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.9
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.11
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.13
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.15
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.17
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.19
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.21
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.23
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.25
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.27
   MicrosoftWindows Version-
IbmHTTP Server Version6.1.0.29
   MicrosoftWindows Version-
OracleHTTP Server Version10.1.3.5.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 86.82% 0.994
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
http://www.vupen.com/english/advisories/2010/0994
Vendor Advisory
Broken Link
Mailing List
Issue Tracking
http://www.kb.cert.org/vuls/id/280613
Third Party Advisory
US Government Resource
http://www.senseofsecurity.com.au/advisories/SOS-10-002
Third Party Advisory
URL Repurposed