2017-10-16 12:31:07 -04:00
{
2019-03-18 01:53:49 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "secalert@redhat.com" ,
"ID" : "CVE-2010-0010" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-18 01:53:49 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Integer overflow in the ap_proxy_send_fb function in proxy/proxy_util.c in mod_proxy in the Apache HTTP Server before 1.3.42 on 64-bit platforms allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a large chunk size that triggers a heap-based buffer overflow."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "ADV-2010-0240" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2010/0240"
} ,
{
"name" : "http://httpd.apache.org/dev/dist/CHANGES_1.3.42" ,
"refsource" : "CONFIRM" ,
"url" : "http://httpd.apache.org/dev/dist/CHANGES_1.3.42"
} ,
{
"name" : "SSRT090208" ,
"refsource" : "HP" ,
"url" : "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
} ,
{
"name" : "oval:org.mitre.oval:def:7923" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7923"
} ,
{
"name" : "39656" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/39656"
} ,
{
"name" : "38319" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/38319"
} ,
{
"name" : "modproxy-approxysendfb-bo(55941)" ,
"refsource" : "XF" ,
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55941"
} ,
{
"name" : "20100127 Mod_proxy from apache 1.3 - Integer overflow which causes heap overflow." ,
"refsource" : "FULLDISC" ,
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0589.html"
} ,
{
"name" : "http://blog.pi3.com.pl/?p=69" ,
"refsource" : "MISC" ,
"url" : "http://blog.pi3.com.pl/?p=69"
} ,
{
"name" : "20100127 Mod_proxy from apache 1.3 - Integer overflow which causes heap overflow." ,
"refsource" : "BUGTRAQ" ,
"url" : "http://www.securityfocus.com/archive/1/509185/100/0/threaded"
} ,
{
"name" : "SUSE-SR:2010:010" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html"
} ,
{
"name" : "HPSBOV02683" ,
"refsource" : "HP" ,
"url" : "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
} ,
{
"name" : "http://site.pi3.com.pl/adv/mod_proxy.txt" ,
"refsource" : "MISC" ,
"url" : "http://site.pi3.com.pl/adv/mod_proxy.txt"
} ,
{
"name" : "37966" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/37966"
} ,
{
"name" : "http://packetstormsecurity.org/1001-exploits/modproxy-overflow.txt" ,
"refsource" : "MISC" ,
"url" : "http://packetstormsecurity.org/1001-exploits/modproxy-overflow.txt"
} ,
{
"name" : "1023533" ,
"refsource" : "SECTRACK" ,
"url" : "http://www.securitytracker.com/id?1023533"
} ,
{
"name" : "ADV-2010-1001" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2010/1001"
2021-03-30 12:01:20 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/" ,
"url" : "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
2021-03-30 13:02:20 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/" ,
"url" : "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E"
2021-06-06 11:00:51 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html" ,
"url" : "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/" ,
"url" : "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/" ,
"url" : "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/" ,
"url" : "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[httpd-cvs] 20210606 svn commit: r1075470 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html" ,
"url" : "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E"
2019-03-18 01:53:49 +00:00
}
]
}
}