CVE-2010-1452

N/A Unknown
Published: July 28, 2010 Modified: April 29, 2026
View on NVD

Description

The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://blogs.sun.com/security/entry/cve_2010_1452_mod_dav
Source: secalert@redhat.com
Broken Link Third Party Advisory
http://httpd.apache.org/security/vulnerabilities_22.html
Source: secalert@redhat.com
Third Party Advisory
http://marc.info/?l=apache-announce&m=128009718610929&w=2
Source: secalert@redhat.com
Patch Vendor Advisory
http://marc.info/?l=bugtraq&m=129190899612998&w=2
Source: secalert@redhat.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=133355494609819&w=2
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://secunia.com/advisories/42367
Source: secalert@redhat.com
Broken Link Third Party Advisory
http://support.apple.com/kb/HT4581
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://ubuntu.com/usn/usn-1021-1
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.redhat.com/support/errata/RHSA-2010-0659.html
Source: secalert@redhat.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0896.html
Source: secalert@redhat.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0897.html
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2010/2218
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2010/3064
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2011/0291
Source: secalert@redhat.com
Broken Link
https://issues.apache.org/bugzilla/show_bug.cgi?id=49246
Source: secalert@redhat.com
Issue Tracking
http://blogs.sun.com/security/entry/cve_2010_1452_mod_dav
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory
http://httpd.apache.org/security/vulnerabilities_22.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=apache-announce&m=128009718610929&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://marc.info/?l=bugtraq&m=129190899612998&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=133355494609819&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/42367
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.467395
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://support.apple.com/kb/HT4581
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://ubuntu.com/usn/usn-1021-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.redhat.com/support/errata/RHSA-2010-0659.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0896.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0897.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/2218
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/3064
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2011/0291
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://issues.apache.org/bugzilla/show_bug.cgi?id=49246
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11683
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12341
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory

84 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
13.9%
94th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

apache