Vulnerability Note VU#280613
Apache mod_isapi module library unload results in orphaned callback pointers
The Apache mod_isapi module can be forced to unload a specific library before the processing of a request is complete, resulting in memory corruption. This vulnerability may allow a remote attacker to execute arbitrary code.
The Apache HTTP server running on Windows platforms contains a flaw in mod_isapi which could enable an attacker to unload ISAPI.dll before request processing is complete. An attacker can send a specially-crafted request and RESET packet to the server, resulting in ISAPI.dll being unloaded. Additional requests can result in memory corruption.
This vulnerability affects Apache httpd versions 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0, 2.0.63, 2.0.61, 2.0.59, 2.0.58, 2.0.55, 2.0.54, 2.0.53, 2.0.52, 2.0.51, 2.0.50, 2.0.49, 2.0.48, 2.0.47, 2.0.46, 2.0.45, 2.0.44, 2.0.43, 2.0.42, 2.0.40, 2.0.39, and 2.0.37.
A remote, unauthenticated attacker may be able to cause a denial of service condition or execute arbitrary code on the system with the privileges of the Apache process. Because the Apache service typically runs with SYSTEM privileges on Windows platforms, an attacker may be able to gain complete control of the system.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apache HTTP Server Project||Affected||-||11 Mar 2010|
CVSS Metrics (Learn More)
Apache credits Brett Gervasoni of Sense of Security for reporting the issue.
This document was written by David Warren.
- CVE IDs: CVE-2010-0425
- CERT Advisory: 03/08/2010
- Date Public: 02 Mar 2010
- Date First Published: 11 Mar 2010
- Date Last Updated: 11 Mar 2010
- Document Revision: 19
If you have feedback, comments, or additional information about this vulnerability, please send us email.