modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
24 Jul 2025, 17:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.7:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.6:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.5:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.2:*:*:*:*:*:*:* |
cpe:2.3:a:ibm:http_server:6.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.25:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.27:*:*:*:*:*:*:* cpe:2.3:a:broadcom:vmware_ace_management_server:*:*:*:*:*:*:*:* cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:z\/os:*:* cpe:2.3:a:ibm:http_server:6.0.2.35:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.29:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.31:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.19:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.19:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.9:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.21:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.13:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.37:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.13:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.5:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.33:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.29:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.7:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.27:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.17:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.9:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.39:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.15:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.21:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.25:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.11:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.23:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.11:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1.0.23:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.15:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0.2.7:*:*:*:*:*:*:* |
First Time |
Broadcom
Ibm websphere Application Server Ibm http Server Oracle http Server Ibm Broadcom vmware Ace Management Server Oracle |
|
References | () http://httpd.apache.org/security/vulnerabilities_20.html - Vendor Advisory | |
References | () http://httpd.apache.org/security/vulnerabilities_22.html - Vendor Advisory | |
References | () http://lists.vmware.com/pipermail/security-announce/2010/000105.html - Broken Link | |
References | () http://secunia.com/advisories/38978 - Broken Link | |
References | () http://secunia.com/advisories/39628 - Broken Link | |
References | () http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=917870&r2=917869&pathrev=917870 - Permissions Required | |
References | () http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/win32/mod_isapi.c?r1=917870&r2=917869&pathrev=917870 - Permissions Required | |
References | () http://svn.apache.org/viewvc?view=revision&revision=917870 - Permissions Required | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1PM09447 - Third Party Advisory | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247 - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/280613 - Third Party Advisory, US Government Resource | |
References | () http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/38494 - Broken Link, Exploit | |
References | () http://www.securitytracker.com/id?1023701 - Broken Link | |
References | () http://www.senseofsecurity.com.au/advisories/SOS-10-002 - Third Party Advisory, URL Repurposed | |
References | () http://www.vmware.com/security/advisories/VMSA-2010-0014.html - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0634 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0994 - Broken Link, Issue Tracking, Mailing List, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/56624 - Third Party Advisory | |
References | () https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E - Issue Tracking, Mailing List | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8439 - Broken Link | |
References | () https://www.exploit-db.com/exploits/11650 - Third Party Advisory |
21 Nov 2024, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://httpd.apache.org/security/vulnerabilities_20.html - | |
References | () http://httpd.apache.org/security/vulnerabilities_22.html - | |
References | () http://lists.vmware.com/pipermail/security-announce/2010/000105.html - | |
References | () http://secunia.com/advisories/38978 - Vendor Advisory | |
References | () http://secunia.com/advisories/39628 - Vendor Advisory | |
References | () http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=917870&r2=917869&pathrev=917870 - | |
References | () http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/win32/mod_isapi.c?r1=917870&r2=917869&pathrev=917870 - | |
References | () http://svn.apache.org/viewvc?view=revision&revision=917870 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1PM09447 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247 - | |
References | () http://www.kb.cert.org/vuls/id/280613 - US Government Resource | |
References | () http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html - | |
References | () http://www.securityfocus.com/bid/38494 - Exploit | |
References | () http://www.securitytracker.com/id?1023701 - | |
References | () http://www.senseofsecurity.com.au/advisories/SOS-10-002 - URL Repurposed | |
References | () http://www.vmware.com/security/advisories/VMSA-2010-0014.html - | |
References | () http://www.vupen.com/english/advisories/2010/0634 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0994 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/56624 - | |
References | () https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8439 - | |
References | () https://www.exploit-db.com/exploits/11650 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.senseofsecurity.com.au/advisories/SOS-10-002 - URL Repurposed |
06 Jun 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jun 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2010-03-05 19:30
Updated : 2025-07-24 17:43
NVD link : CVE-2010-0425
Mitre link : CVE-2010-0425
CVE.ORG link : CVE-2010-0425
JSON object : View
Products Affected
ibm
- websphere_application_server
- http_server
broadcom
- vmware_ace_management_server
microsoft
- windows
oracle
- http_server
apache
- http_server
CWE