### [CVE-2010-0010](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0010) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Integer overflow in the ap_proxy_send_fb function in proxy/proxy_util.c in mod_proxy in the Apache HTTP Server before 1.3.42 on 64-bit platforms allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a large chunk size that triggers a heap-based buffer overflow. ### POC #### Reference - http://blog.pi3.com.pl/?p=69 - http://packetstormsecurity.org/1001-exploits/modproxy-overflow.txt - http://site.pi3.com.pl/adv/mod_proxy.txt #### Github No PoCs found on GitHub currently.