mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.
References
Configurations
Configuration 1 (hide)
AND |
|
History
07 Nov 2023, 02:05
Type | Values Removed | Values Added |
---|---|---|
Summary | mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions. |
Information
Published : 2010-08-05 18:17
Updated : 2024-02-28 11:41
NVD link : CVE-2010-2791
Mitre link : CVE-2010-2791
CVE.ORG link : CVE-2010-2791
JSON object : View
Products Affected
unix
- unix
apache
- http_server
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor