Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-0425 | First vendor Publication | 2010-03-05 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0425 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:8439 | |||
Oval ID: | oval:org.mitre.oval:def:8439 | ||
Title: | Apache 'mod_isapi' Memory Corruption Vulnerability | ||
Description: | modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0425 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows 7 | Product(s): | Apache |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2010-07-09 | Write-to-file Shellcode (Win32) |
2010-03-07 | Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit |
OpenVAS Exploits
Date | Description |
---|---|
2010-10-01 | Name : VMware Products Security Bypass Vulnerability (Linux) -Sep10 File : nvt/secpod_vmware_prdts_sec_bypass_vuln_lin_sep10.nasl |
2010-10-01 | Name : VMware Products Security Bypass Vulnerability (Win) -Sep10 File : nvt/secpod_vmware_prdts_sec_bypass_vuln_win_sep10.nasl |
2010-03-04 | Name : Apache Multiple Security Vulnerabilities File : nvt/gb_apache_38494.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2010-067-01 httpd File : nvt/esoft_slk_ssa_2010_067_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
62674 | Apache HTTP Server mod_isapi Module Unloading Crafted Request Remote DoS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Apache mod_isapi dangling pointer exploit attempt RuleID : 19124 - Revision : 7 - Type : SERVER-APACHE |
2014-01-10 | Apache mod_isapi dangling pointer code execution attempt RuleID : 19107 - Revision : 10 - Type : SERVER-APACHE |
2014-01-10 | Apache mod_isapi dangling pointer exploit attempt RuleID : 16480 - Revision : 5 - Type : SERVER-APACHE |
2014-01-10 | Apache mod_isapi dangling pointer exploit attempt - public shell code RuleID : 16479 - Revision : 5 - Type : SERVER-APACHE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-10-31 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-2907-1.nasl - Type : ACT_GATHER_INFO |
2013-08-11 | Name : The remote web server may be affected by multiple vulnerabilities. File : oracle_http_server_cpu_jul_2013.nasl - Type : ACT_GATHER_INFO |
2010-10-20 | Name : The remote web server is affected by multiple vulnerabilities. File : apache_2_0_64.nasl - Type : ACT_GATHER_INFO |
2010-10-20 | Name : The remote web server is affected by multiple vulnerabilities File : apache_2_2_15.nasl - Type : ACT_GATHER_INFO |
2010-03-09 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2010-067-01.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:09:16 |
|
2024-11-28 12:21:07 |
|
2024-02-14 13:28:22 |
|
2023-11-07 21:47:37 |
|
2021-06-06 17:23:02 |
|
2021-06-03 13:23:13 |
|
2021-03-30 17:22:47 |
|
2020-05-23 13:16:54 |
|
2020-05-23 00:25:14 |
|
2019-08-27 12:03:18 |
|
2018-10-31 00:20:02 |
|
2017-11-01 13:25:10 |
|
2017-09-19 09:23:38 |
|
2017-08-17 09:22:54 |
|
2016-09-30 01:02:19 |
|
2016-06-28 18:01:15 |
|
2016-04-26 19:33:33 |
|
2016-03-10 13:23:12 |
|
2016-03-10 09:24:45 |
|
2014-02-17 10:53:41 |
|
2014-01-19 21:26:36 |
|
2013-07-17 21:18:43 |
|
2013-05-10 23:17:31 |
|