ID CVE-2009-1956
Summary Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:apr-util:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.18:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.4:*:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 29-09-2017 - 01:34)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:P
oval via4
  • accepted 2013-04-29T04:14:43.643-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
    family unix
    id oval:org.mitre.oval:def:11567
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
    version 30
  • accepted 2015-04-20T04:00:20.059-04:00
    class vulnerability
    contributors
    • name K, Balamurugan
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
    family unix
    id oval:org.mitre.oval:def:12237
    status accepted
    submitted 2011-02-01T12:25:58.000-05:00
    title HP-UX Apache-based Web Server, Local Information Disclosure, Increase of Privilege, Remote Denial of Service (DoS)
    version 48
redhat via4
advisories
  • bugzilla
    id 504555
    title CVE-2009-1955 apr-util billion laughs attack
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • comment apr-util is earlier than 0:0.9.4-22.el4_8.1
            oval oval:com.redhat.rhsa:tst:20091107001
          • comment apr-util is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20091107002
        • AND
          • comment apr-util-devel is earlier than 0:0.9.4-22.el4_8.1
            oval oval:com.redhat.rhsa:tst:20091107003
          • comment apr-util-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20091107004
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • comment apr-util is earlier than 0:1.2.7-7.el5_3.1
            oval oval:com.redhat.rhsa:tst:20091107006
          • comment apr-util is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091107007
        • AND
          • comment apr-util-devel is earlier than 0:1.2.7-7.el5_3.1
            oval oval:com.redhat.rhsa:tst:20091107008
          • comment apr-util-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091107009
        • AND
          • comment apr-util-docs is earlier than 0:1.2.7-7.el5_3.1
            oval oval:com.redhat.rhsa:tst:20091107010
          • comment apr-util-docs is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091107011
    rhsa
    id RHSA-2009:1107
    released 2009-06-16
    severity Moderate
    title RHSA-2009:1107: apr-util security update (Moderate)
  • rhsa
    id RHSA-2009:1108
rpms
  • apr-util-0:0.9.4-22.el4_8.1
  • apr-util-0:1.2.7-7.el5_3.1
  • apr-util-debuginfo-0:0.9.4-22.el4_8.1
  • apr-util-debuginfo-0:1.2.7-7.el5_3.1
  • apr-util-devel-0:0.9.4-22.el4_8.1
  • apr-util-devel-0:1.2.7-7.el5_3.1
  • apr-util-docs-0:1.2.7-7.el5_3.1
  • httpd-0:2.0.46-73.ent
  • httpd-debuginfo-0:2.0.46-73.ent
  • httpd-devel-0:2.0.46-73.ent
  • mod_ssl-1:2.0.46-73.ent
  • ant-0:1.6.5-1jpp_1rh
  • avalon-logkit-0:1.2-2jpp_4rh
  • axis-0:1.2.1-1jpp_3rh
  • classpathx-jaf-0:1.0-2jpp_6rh
  • classpathx-mail-0:1.1.1-2jpp_8rh
  • geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh
  • geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh
  • geronimo-specs-0:1.0-0.M4.1jpp_10rh
  • geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh
  • jakarta-commons-modeler-0:2.0-3jpp_2rh
  • log4j-0:1.2.12-1jpp_1rh
  • mx4j-1:3.0.1-1jpp_4rh
  • pcsc-lite-0:1.3.3-3.el4
  • pcsc-lite-debuginfo-0:1.3.3-3.el4
  • pcsc-lite-doc-0:1.3.3-3.el4
  • pcsc-lite-libs-0:1.3.3-3.el4
  • rhpki-ca-0:7.3.0-20.el4
  • rhpki-java-tools-0:7.3.0-10.el4
  • rhpki-kra-0:7.3.0-14.el4
  • rhpki-manage-0:7.3.0-19.el4
  • rhpki-native-tools-0:7.3.0-6.el4
  • rhpki-ocsp-0:7.3.0-13.el4
  • rhpki-tks-0:7.3.0-13.el4
  • tomcat5-0:5.5.23-0jpp_4rh.16
  • tomcat5-common-lib-0:5.5.23-0jpp_4rh.16
  • tomcat5-jasper-0:5.5.23-0jpp_4rh.16
  • tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16
  • tomcat5-server-lib-0:5.5.23-0jpp_4rh.16
  • tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16
  • xerces-j2-0:2.7.1-1jpp_1rh
  • xml-commons-0:1.3.02-2jpp_1rh
  • xml-commons-apis-0:1.3.02-2jpp_1rh
refmap via4
aixapar
  • PK88341
  • PK91241
  • PK99478
apple APPLE-SA-2009-11-09-1
bid 35251
confirm
fedora
  • FEDORA-2009-5969
  • FEDORA-2009-6014
  • FEDORA-2009-6261
gentoo GLSA-200907-03
hp
  • HPSBUX02612
  • SSRT100345
mandriva
  • MDVSA-2009:131
  • MDVSA-2013:150
mlist
  • [dev] 20090424 Buffer overflow in apr_brigade_vprintf() ?
  • [dev] 20090424 Re: Buffer overflow in apr_brigade_vprintf() ?
  • [httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • [httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • [httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • [httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • [oss-security] 20090605 CVE Request (apr-util)
secunia
  • 34724
  • 35284
  • 35395
  • 35487
  • 35565
  • 35710
  • 35797
  • 35843
  • 37221
ubuntu
  • USN-786-1
  • USN-787-1
vupen
  • ADV-2009-1907
  • ADV-2009-3184
Last major update 29-09-2017 - 01:34
Published 08-06-2009 - 01:00
Last modified 29-09-2017 - 01:34
Back to Top