Search for vulnerabilities
Vulnerability details: VCID-xfau-vqn8-aaah
Vulnerability ID VCID-xfau-vqn8-aaah
Aliases CVE-2010-0425
Summary modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.85702 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.85702 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.85702 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.876 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.96987 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.96987 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.96987 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.97041 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.97041 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.97041 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.97041 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.97155 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
epss 0.97155 https://api.first.org/data/v1/epss?cve=CVE-2010-0425
apache_httpd important https://httpd.apache.org/security/json/CVE-2010-0425.json
cvssv2 10.0 https://nvd.nist.gov/vuln/detail/CVE-2010-0425
generic_textual MODERATE http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247
Reference id Reference type URL
http://httpd.apache.org/security/vulnerabilities_20.html
http://httpd.apache.org/security/vulnerabilities_22.html
http://lists.vmware.com/pipermail/security-announce/2010/000105.html
https://api.first.org/data/v1/epss?cve=CVE-2010-0425
http://secunia.com/advisories/38978
http://secunia.com/advisories/39628
https://exchange.xforce.ibmcloud.com/vulnerabilities/56624
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8439
http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=917870&r2=917869&pathrev=917870
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/win32/mod_isapi.c?r1=917870&r2=917869&pathrev=917870
http://svn.apache.org/viewvc?view=revision&revision=917870
https://www.exploit-db.com/exploits/11650
http://www-01.ibm.com/support/docview.wss?uid=swg1PM09447
http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247
http://www.kb.cert.org/vuls/id/280613
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
http://www.securityfocus.com/bid/38494
http://www.securitytracker.com/id?1023701
http://www.vmware.com/security/advisories/VMSA-2010-0014.html
http://www.vupen.com/english/advisories/2010/0634
http://www.vupen.com/english/advisories/2010/0994
CVE-2010-0425 https://httpd.apache.org/security/json/CVE-2010-0425.json
CVE-2010-0425 https://nvd.nist.gov/vuln/detail/CVE-2010-0425
CVE-2010-0425;OSVDB-62674 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/11650.c
CVE-2010-0425;OSVDB-62674 Exploit http://www.senseofsecurity.com.au/advisories/SOS-10-002
Data source Exploit-DB
Date added March 6, 2010
Description Apache 2.2.14 mod_isapi - Dangling Pointer Remote SYSTEM
Ransomware campaign use Known
Source publication date March 7, 2010
Exploit type remote
Platform windows
Source update date Jan. 31, 2017
Source URL http://www.senseofsecurity.com.au/advisories/SOS-10-002
Data source Metasploit
Description This module triggers a use-after-free vulnerability in the Apache Software Foundation mod_isapi extension for versions 2.2.14 and earlier. In order to reach the vulnerable code, the target server must have an ISAPI module installed and configured. By making a request that terminates abnormally (either an aborted TCP connection or an unsatisfied chunked request), mod_isapi will unload the ISAPI extension. Later, if another request comes for that ISAPI module, previously obtained pointers will be used resulting in an access violation or potentially arbitrary code execution. Although arbitrary code execution is theoretically possible, a real-world method of invoking this consequence has not been proven. In order to do so, one would need to find a situation where a particular ISAPI module loads at an image base address that can be re-allocated by a remote attacker. Limited success was encountered using two separate ISAPI modules. In this scenario, a second ISAPI module was loaded into the same memory area as the previously unloaded module.
Note
Stability:
  - crash-service-down
SideEffects: []
Reliability: []
Ransomware campaign use Unknown
Source publication date March 5, 2010
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/http/apache_mod_isapi.rb
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2010-0425
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.99324
EPSS Score 0.85702
Published At May 3, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.