ID CVE-2009-1955
Summary The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:apr-util:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.18:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 10-10-2018 - 19:39)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:C
oval via4
  • accepted 2013-04-29T04:04:11.684-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
    family unix
    id oval:org.mitre.oval:def:10270
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
    version 24
  • accepted 2015-04-20T04:00:26.717-04:00
    class vulnerability
    contributors
    • name K, Balamurugan
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
    family unix
    id oval:org.mitre.oval:def:12473
    status accepted
    submitted 2011-02-01T12:25:58.000-05:00
    title HP-UX Apache-based Web Server, Local Information Disclosure, Increase of Privilege, Remote Denial of Service (DoS)
    version 45
redhat via4
advisories
  • rhsa
    id RHSA-2009:1107
  • rhsa
    id RHSA-2009:1108
rpms
  • apr-util-0:0.9.4-22.el4_8.1
  • apr-util-devel-0:0.9.4-22.el4_8.1
  • apr-util-0:1.2.7-7.el5_3.1
  • apr-util-devel-0:1.2.7-7.el5_3.1
  • apr-util-docs-0:1.2.7-7.el5_3.1
  • httpd-0:2.0.46-73.ent
  • httpd-devel-0:2.0.46-73.ent
  • mod_ssl-0:2.0.46-73.ent
refmap via4
aixapar
  • PK88342
  • PK91241
  • PK99478
apple APPLE-SA-2009-11-09-1
bid 35253
bugtraq 20090824 rPSA-2009-0123-1 apr-util
confirm
debian DSA-1812
exploit-db 8842
fedora
  • FEDORA-2009-5969
  • FEDORA-2009-6014
  • FEDORA-2009-6261
gentoo GLSA-200907-03
hp
  • HPSBUX02612
  • SSRT100345
mandriva
  • MDVSA-2009:131
  • MDVSA-2013:150
mlist
  • [apr-dev] 20090602 [PATCH] prevent "billion laughs" attack against expat
  • [oss-security] 20090603 CVE request: "billion laughs" attack against Apache APR
secunia
  • 34724
  • 35284
  • 35360
  • 35395
  • 35444
  • 35487
  • 35565
  • 35710
  • 35797
  • 35843
  • 36473
  • 37221
slackware SSA:2009-167-02
suse SUSE-SR:2010:011
ubuntu
  • USN-786-1
  • USN-787-1
vupen
  • ADV-2009-1907
  • ADV-2009-3184
  • ADV-2010-1107
Last major update 10-10-2018 - 19:39
Published 08-06-2009 - 01:00
Back to Top