Anfälligkeitssuche        Suche in 191973 CVE Beschreibungen
und 86218 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

CVE Kennung:CVE-2010-1623
Beschreibung:Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
Test Kennungen: 1.3.6.1.4.1.25623.1.0.68353   1.3.6.1.4.1.25623.1.0.68678   1.3.6.1.4.1.25623.1.0.68278   1.3.6.1.4.1.25623.1.0.68152   1.3.6.1.4.1.25623.1.0.68350   1.3.6.1.4.1.25623.1.0.68406   1.3.6.1.4.1.25623.1.0.68962   1.3.6.1.4.1.25623.1.0.68924   1.3.6.1.4.1.25623.1.0.69200   1.3.6.1.4.1.25623.1.0.801521   1.3.6.1.4.1.25623.1.0.122292   1.3.6.1.4.1.25623.1.0.881306   1.3.6.1.4.1.25623.1.0.880461  
Querverweise: Common Vulnerability Exposure (CVE) ID: CVE-2010-1623
AIX APAR: PM23263
http://www-01.ibm.com/support/docview.wss?uid=swg1PM31601
AIX APAR: PM31601
http://www-01.ibm.com/support/docview.wss?uid=swg1PM31601
BugTraq ID: 43673
http://www.securityfocus.com/bid/43673
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049939.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049885.html
HPdes Security Advisory: HPSBUX02645
http://marc.info/?l=bugtraq&m=130168502603566&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2010:192
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12800
RedHat Security Advisories: RHSA-2010:0950
http://www.redhat.com/support/errata/RHSA-2010-0950.html
RedHat Security Advisories: RHSA-2011:0896
http://www.redhat.com/support/errata/RHSA-2011-0896.html
RedHat Security Advisories: RHSA-2011:0897
http://www.redhat.com/support/errata/RHSA-2011-0897.html
http://secunia.com/advisories/41701
http://secunia.com/advisories/42015
http://secunia.com/advisories/42361
http://secunia.com/advisories/42367
http://secunia.com/advisories/42403
http://secunia.com/advisories/42537
http://secunia.com/advisories/43211
http://secunia.com/advisories/43285
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.627828
SuSE Security Announcement: SUSE-SU-2011:1229 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html
http://ubuntu.com/usn/usn-1021-1
http://www.ubuntu.com/usn/USN-1022-1
http://www.vupen.com/english/advisories/2010/2556
http://www.vupen.com/english/advisories/2010/2557
http://www.vupen.com/english/advisories/2010/2806
http://www.vupen.com/english/advisories/2010/3064
http://www.vupen.com/english/advisories/2010/3065
http://www.vupen.com/english/advisories/2010/3074
http://www.vupen.com/english/advisories/2011/0358




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.