mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T02:46:47.753Z
Reserved: 2010-07-22T00:00:00
Link: CVE-2010-2791

No data.

Status : Modified
Published: 2010-08-05T18:17:57.667
Modified: 2024-11-21T01:17:23.063
Link: CVE-2010-2791
