Download
Abstract
Repeated malicious requests to URLs configured to be handled by mod_isapi can cause errors, crashes, or remote execution.
Download Description
PM09447 resolves the following problem:
ERROR DESCRIPTION:
CVE-2010-0425 mod_isapi vulnerability
LOCAL FIX:
N/A
PROBLEM SUMMARY
USERS AFFECTED:
IBM HTTP Server 6.0 or 6.1 users on the Windows operating system that have uncommented the LoadModule directive for the 'mod_isapi' module and have configured it as a handler.
mod_isapi is an esoteric module that allows Apache HTTP Server to call DLLs designed for use with Microsoft IIS. It is very rarely used with IBM HTTP Server and is not a part of 7.0 or later releases.
PROBLEM DESCRIPTION:
Repeated malicious requests to URLs configured to be handled by mod_isapi can cause errors, crashes, or remote execution.
RECOMMENDATION:
Apply this fix if the 'LoadModule' directive for 'mod_isapi' is enabled in httpd.conf (this module is disabled by default).
PROBLEM CONCLUSION:
The unloading of ISAPI DLL's in mid-request during error cases has been removed, which eliminates the chance for later phases of apache processing to call into the unloaded DLL. ISAPI DLL's are now only unloaded during the final cleanup of a request when no further callbacks are possible.
This fix is targeted for IBM HTTP Server fixpacks:
- 6.0.2.41
- 6.1.0.31
Problems (APARS) fixed
Was this topic helpful?
Document Information
Modified date:
07 September 2022
UID
swg24026208