CVE-2010-1623
Published Oct 4, 2010
Last updated a year ago
Overview
- Description
- Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:apr-util:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3452FCE7-94D2-419B-BDC8-CCEEF997257E", "versionEndIncluding": "1.3.9" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EC87975-74CA-42E6-84ED-0DD2BF9FFC78" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A896FA5-D3FC-4BD9-965A-C9A72D62780D" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8EDB1D0-82A9-462F-9B3B-0EDF452341E2" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9DFFEDC-F5C7-47C7-95A9-6BF4208A1B48" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E87B09F2-ECEA-409D-B27B-0747280D4AC6" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "126268B4-03AF-46B1-9840-80CB461429E1" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "497DE301-1652-40B6-929C-E0FEA4747F72" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0760EF10-E57D-42C6-AB26-9FCFAE40062F" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC6D2840-FF47-470F-B124-743592A6B465" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60ACEF09-740E-4F33-94D3-85CAE7275204" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B355E51C-5CD6-48B9-8354-1F1F04F57AED" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "863D04D6-8F9F-4B11-ACDC-EF52EC9A89F7" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A79C98D4-635D-4CBB-9F29-4C8BB7B8CF0D" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FA24824-09F7-43FF-B28D-EA4783C70072" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F129705-D555-4D48-97CC-82660DC9641E" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56723D23-E6BC-4BB6-931E-5802528BE4A4" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "209C34A8-B339-44C3-B21C-A38F2AE7C8CA" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC99316E-3B24-4B5E-86F7-2C52F46B12AD" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67AB6223-9546-4906-B502-C82E3969FC76" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6459BE22-2334-48B3-85B8-5BEEB05A5399" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A24FB91C-33BC-4305-AD53-0385E3B3F091" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "617C8C4B-8367-4EFB-8DA1-88986F6CDACA" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D85D6B73-F2CB-427D-9896-6BA79BE96FB5" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39B4A447-29CC-4D35-B25D-FA845785E66B" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08B50283-4187-42F7-A2A3-F5789706708B" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40FD8140-F1E0-4F99-ACDA-926C0ACDC00E" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61D253E8-528E-47B3-887A-C540A8D91E0D" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD1CD8A7-6F0A-4BEB-8E8A-BEDAB71921E3" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1D0594C-E2FF-4557-80E6-8F51A4D94F7A" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14EC5623-76A8-4519-A3F5-B0594B304630" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEC14399-2A54-428F-80E4-196BAF52146E" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CE30137-16C4-41CC-BE90-D8D66224E0E8" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.2.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0BEC1C3-2597-489D-A65B-21F6CFD5A288" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E706184-E7BC-452F-82FE-72EA8C37F4D6" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "867962AD-8EF4-4DC4-96F6-77896CEF3F92" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EB78030-8C3B-4ACA-B62B-DC5DC5FBD073" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E53CBDDE-D914-49A8-B65C-9352487B3CBA" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3C48811-5237-4752-857E-AEA5E879505A" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC3307A0-BCD6-423F-AC32-2E4F1E1310F6" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA93EC05-1936-4A2A-BFE1-E3F3BA2FD20F" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E3B4C44-163C-4D92-9BB0-C3BEC4F65665" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EBD5602-6DE8-47EC-8464-150D2AA562BC" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "838655CB-43E7-4BDA-A80C-2314C9870717", "versionEndExcluding": "2.0.64", "versionStartIncluding": "2.0.35" }, { "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91F58140-8FBA-4733-9E2B-493BC9E5B284", "versionEndExcluding": "2.2.17", "versionStartIncluding": "2.2.0" } ], "operator": "OR" } ] } ]