modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
24 Jul 2025, 17:43
Type | Values Removed | Values Added |
---|---|---|
First Time |
Oracle
Oracle http Server Broadcom Ibm websphere Application Server Broadcom vmware Ace Management Server Ibm Ibm http Server |
|
CPE | cpe:2.3:a:apache:http_server:2.3.5:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.6:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.7:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:* |
cpe:2.3:a:ibm:http_server:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.15:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.7:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.9:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.19:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.11:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.17:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.7:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.15:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.13:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.19:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.29:*:*:*:*:*:*:* cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.27:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.23:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.25:*:*:*:*:*:*:* cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:z\/os:*:* cpe:2.3:a:ibm:http_server:6.0.2.11:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.33:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.29:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.35:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.31:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.9:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.37:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.13:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.23:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.21:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.21:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:vmware_ace_management_server:*:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.25:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.27:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.39:*:*:*:*:*:*:* |
References | () https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () http://httpd.apache.org/security/vulnerabilities_20.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/38494 - Broken Link, Exploit | |
References | () https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () http://svn.apache.org/viewvc?view=revision&revision=917870 - Permissions Required | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/56624 - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/280613 - Third Party Advisory, US Government Resource | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247 - Third Party Advisory | |
References | () https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () http://www.securitytracker.com/id?1023701 - Broken Link | |
References | () https://www.exploit-db.com/exploits/11650 - Third Party Advisory | |
References | () https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () http://www.vmware.com/security/advisories/VMSA-2010-0014.html - Third Party Advisory | |
References | () http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=917870&r2=917869&pathrev=917870 - Permissions Required | |
References | () https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () http://lists.vmware.com/pipermail/security-announce/2010/000105.html - Broken Link | |
References | () https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () http://www.senseofsecurity.com.au/advisories/SOS-10-002 - Third Party Advisory, URL Repurposed | |
References | () https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () http://www.vupen.com/english/advisories/2010/0994 - Broken Link, Issue Tracking, Mailing List, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0634 - Broken Link, Vendor Advisory | |
References | () https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html - Third Party Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8439 - Broken Link | |
References | () http://secunia.com/advisories/38978 - Broken Link | |
References | () https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () http://secunia.com/advisories/39628 - Broken Link | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1PM09447 - Third Party Advisory | |
References | () https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () http://httpd.apache.org/security/vulnerabilities_22.html - Vendor Advisory | |
References | () https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/win32/mod_isapi.c?r1=917870&r2=917869&pathrev=917870 - Permissions Required | |
References | () https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List |
21 Nov 2024, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://httpd.apache.org/security/vulnerabilities_20.html - | |
References | () http://www.securityfocus.com/bid/38494 - Exploit | |
References | () http://svn.apache.org/viewvc?view=revision&revision=917870 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/56624 - | |
References | () http://www.kb.cert.org/vuls/id/280613 - US Government Resource | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247 - | |
References | () https://www.exploit-db.com/exploits/11650 - | |
References | () http://www.securitytracker.com/id?1023701 - | |
References | () http://www.vmware.com/security/advisories/VMSA-2010-0014.html - | |
References | () http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=917870&r2=917869&pathrev=917870 - | |
References | () http://lists.vmware.com/pipermail/security-announce/2010/000105.html - | |
References | () http://www.senseofsecurity.com.au/advisories/SOS-10-002 - URL Repurposed | |
References | () http://www.vupen.com/english/advisories/2010/0994 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0634 - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8439 - | |
References | () http://secunia.com/advisories/38978 - Vendor Advisory | |
References | () http://secunia.com/advisories/39628 - Vendor Advisory | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1PM09447 - | |
References | () http://httpd.apache.org/security/vulnerabilities_22.html - | |
References | () http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/win32/mod_isapi.c?r1=917870&r2=917869&pathrev=917870 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://www.senseofsecurity.com.au/advisories/SOS-10-002 - URL Repurposed |
07 Nov 2023, 02:05
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2010-03-05 19:30
Updated : 2025-07-24 17:43
NVD link : CVE-2010-0425
Mitre link : CVE-2010-0425
JSON object : View
Products Affected
ibm
- websphere_application_server
- http_server
apache
- http_server
oracle
- http_server
broadcom
- vmware_ace_management_server
microsoft
- windows
CWE