{"vuid":"VU#280613","idnumber":"280613","name":"Apache mod_isapi module library unload results in orphaned callback pointers","keywords":["Apache","SA38776","information disclosure","DoS","Denial-of-Service","system access","isapi","mod_isapi","orphaned callback"],"overview":"The Apache mod_isapi module can be forced to unload a specific library before the processing of a request is complete, resulting in memory corruption. This vulnerability may allow a remote attacker to execute arbitrary code.","clean_desc":"The Apache HTTP server running on Windows platforms contains a flaw in mod_isapi which could enable an attacker to unload ISAPI.dll before request processing is complete. An attacker can send a specially-crafted request and RESET packet to the server, resulting in ISAPI.dll being unloaded. Additional requests can result in memory corruption. This vulnerability affects Apache httpd versions 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0, 2.0.63, 2.0.61, 2.0.59, 2.0.58, 2.0.55, 2.0.54, 2.0.53, 2.0.52, 2.0.51, 2.0.50, 2.0.49, 2.0.48, 2.0.47, 2.0.46, 2.0.45, 2.0.44, 2.0.43, 2.0.42, 2.0.40, 2.0.39, and 2.0.37.","impact":"A remote, unauthenticated attacker may be able to cause a denial of service condition or execute arbitrary code on the system with the privileges of the Apache process. Because the Apache service typically runs with SYSTEM privileges on Windows platforms, an attacker may be able to gain complete control of the system.","resolution":"Apply Patch\nThe Apache Software Foundation has released httpd 2.2.15 and 2.0.64-dev, which address this and other issues. Updates can be found on the Apache httpd website.","workarounds":"","sysaffected":"","thanks":"Apache \ncredits\n Brett Gervasoni of Sense of Security for reporting the issue.","author":"This document was written by David Warren.","public":["http://httpd.apache.org/security/vulnerabilities_22.html","http://httpd.apache.org/security/vulnerabilities_20.html","http://secunia.com/advisories/38776/","http://svn.apache.org/viewvc?view=revision&revision=917875","http://svn.apache.org/viewvc?view=revision&revision=917870","https://issues.apache.org/bugzilla/show_bug.cgi?id=48359"," http://www.senseofsecurity.com.au/advisories/SOS-10-002"],"cveids":["CVE-2010-0425"],"certadvisory":"03/08/2010","uscerttechnicalalert":null,"datecreated":"2010-03-08T16:12:04Z","publicdate":"2010-03-02T00:00:00Z","datefirstpublished":"2010-03-11T16:48:56Z","dateupdated":"2010-03-11T16:56:22Z","revision":20,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.0,"vulnote":null}