protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
History
07 Nov 2023, 02:09
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
14 Sep 2022, 19:51
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | (HP) http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/48551 - Not Applicable | |
References | (MLIST) https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html - Third Party Advisory | |
References | (CONFIRM) http://support.apple.com/kb/HT5501 - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0542.html - Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - Broken Link | |
References | (MLIST) https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (CONFIRM) http://svn.apache.org/viewvc?view=revision&revision=1235454 - Patch, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=133951357207000&w=2 - Issue Tracking, Mailing List, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/51706 - Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0128.html - Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (DEBIAN) http://www.debian.org/security/2012/dsa-2405 - Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0543.html - Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=133494237717847&w=2 - Issue Tracking, Mailing List, Third Party Advisory | |
References | (CONFIRM) http://kb.juniper.net/JSA10585 - Third Party Advisory | |
References | (APPLE) http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html - Broken Link, Mailing List | |
References | (MLIST) https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=133294460209056&w=2 - Issue Tracking, Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=136441204617335&w=2 - Issue Tracking, Mailing List, Third Party Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=785069 - Issue Tracking, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2012:012 - Broken Link | |
References | (MLIST) https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00002.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
CPE | cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:* cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:* |
First Time |
Redhat storage
Redhat Debian Redhat enterprise Linux Server Redhat enterprise Linux Desktop Redhat jboss Enterprise Web Server Redhat enterprise Linux Eus Suse Suse linux Enterprise Software Development Kit Redhat enterprise Linux Opensuse opensuse Redhat enterprise Linux Workstation Debian debian Linux Suse linux Enterprise Server Opensuse |
06 Jun 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jun 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Mar 2021, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2012-01-28 04:05
Updated : 2023-12-10 11:03
NVD link : CVE-2012-0053
Mitre link : CVE-2012-0053
CVE.ORG link : CVE-2012-0053
JSON object : View
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server
- jboss_enterprise_web_server
- enterprise_linux_eus
- enterprise_linux
- storage
suse
- linux_enterprise_server
- linux_enterprise_software_development_kit
opensuse
- opensuse
debian
- debian_linux
apache
- http_server
CWE