Race condition in the mod_auth_shadow module for the Apache HTTP Server allows remote attackers to bypass authentication, and read and possibly modify data, via vectors related to improper interaction with an external helper application for validation of credentials.
References
Configurations
History
21 Nov 2024, 01:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041326.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041340.html - | |
References | () http://secunia.com/advisories/39823 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:081 - | |
References | () http://www.securityfocus.com/bid/39538 - | |
References | () http://www.vupen.com/english/advisories/2010/0908 - | |
References | () http://www.vupen.com/english/advisories/2010/1148 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=578168 - Patch |
Information
Published : 2010-04-20 16:30
Updated : 2024-11-21 01:13
NVD link : CVE-2010-1151
Mitre link : CVE-2010-1151
CVE.ORG link : CVE-2010-1151
JSON object : View
Products Affected
apache
- apache_http_server
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')