漏洞信息详情
Apache mod_proxy_ajp模块入站请求体远程拒绝服务漏洞
- CNNVD编号:CNNVD-201003-069
- 危害等级: 中危
- CVE编号: CVE-2010-0408
- 漏洞类型: 其他
- 发布时间: 2010-03-05
- 威胁类型: 远程
- 更新时间: 2021-06-07
- 厂 商: apache
- 漏洞来源: Niku Toivola※ niku...
漏洞简介
Apache HTTP Server是一款流行的Web服务器。
Apache HTTP Server在处理某些畸形的入站消息时,Apache服务器mod_proxy_ajp模块的modules/proxy/mod_proxy_ajp.c文件中的ap_proxy_ajp_request()函数可能会返回HTTP_INTERNAL_SERVER_ERROR的出错代码。这可能导致后端服务器一直处于出错状态,直到重试超时过期。
漏洞公告
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://svn.apache.org/viewvc?view=revision&revision=917876
参考网址
来源:httpd.apache.org%3E
链接:httpd.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.HTML/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.
来源:DEBIAN
链接:https://www.debian.org/security/2010/dsa-2035
来源:OVAL
链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9935
来源:FEDORA
链接:http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.HTML
来源:SECUNIA
链接:http://secunia.com/advisories/39632
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2010/1411
来源:CONFIRM
链接:https://bugzilla.redhat.com/show_bug.cgi?id=569905
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2010/1057
来源:SECUNIA
链接:http://secunia.com/advisories/39628
来源:CONFIRM
链接:http://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/kb/HT4435
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2010/0911
来源:httpd.apache.org
链接:httpd.apache.org/security/vulnerabilities_22.HTML
来源:CONFIRM
链接:http://svn.apache.org/viewvc?view=revision&revision=917876
来源:MLIST
链接:https://lists.apache.org/thread.HTML/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.
来源:MANDRIVA
链接:http://www.mandriva.com/security/advisories?name=MDVSA-2010:053
来源:MLIST
链接:https://lists.apache.org/thread.HTML/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.
来源:FEDORA
链接:http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.HTML
来源:BID
链接:https://www.securityfocus.com/bid/38491
来源:SECUNIA
链接:http://secunia.com/advisories/40096
来源:AIXAPAR
链接:http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2010/1001
来源:MLIST
链接:https://lists.apache.org/thread.HTML/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.
来源:CONFIRM
链接:http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.HTML
来源:MLIST
链接:https://lists.apache.org/thread.HTML/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.
来源:OVAL
链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8619
来源:MLIST
链接:https://lists.apache.org/thread.HTML/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.
来源:HP
链接:http://marc.info/?l=bugtraq&m=127557640302499&w=2
来源:SECUNIA
链接:http://secunia.com/advisories/39501
来源:MLIST
链接:https://lists.apache.org/thread.HTML/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.
来源:httpd
链接:httpd/branches/2.2.x/modules/proxy/mod_proxy_ajp.c?r1=917876&r2=917875&pathrev=917876
来源:CONFIRM
链接:http://svn.apache.org/viewvc/
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2010/0994
来源:AIXAPAR
链接:http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829
来源:MLIST
链接:https://lists.apache.org/thread.HTML/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.
来源:SECUNIA
链接:http://secunia.com/advisories/39100
来源:MLIST
链接:https://lists.apache.org/thread.HTML/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.
来源:MLIST
链接:https://lists.apache.org/thread.HTML/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.
来源:MLIST
链接:https://lists.apache.org/thread.HTML/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.
来源:SECUNIA
链接:http://secunia.com/advisories/39656
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2010-0168.HTML
来源:MANDRIVA
链接:http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
来源:AIXAPAR
链接:http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247
来源:MLIST
链接:https://lists.apache.org/thread.HTML/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.HTML
来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple
链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2010//Nov/msg00000.HTML
受影响实体
- Apache Http_server:2.2.13
- Apache Http_server:2.2.14
- Apache Http_server:2.2.9
- Apache Http_server:2.2.11
- Apache Http_server:2.2.12
补丁
- 7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX
- 7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX
- 7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows
- 7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows
- 7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows
![weinxin](http://zone.ci/zone_ci_images/zone.ci.png)
评论