ID CVE-2009-2412
Summary Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:apr-util:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.2-dev:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.2-dev:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.3-dev:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.3-dev:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.7-dev:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.7-dev:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:0.9.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:0.9.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.4-dev:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.4-dev:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.6-dev:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.6-dev:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:apr-util:1.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:apr-util:1.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.2-dev:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.2-dev:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.3-dev:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.3-dev:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.7-dev:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.7-dev:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:0.9.16-dev:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:0.9.16-dev:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:1.3.4-dev:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:1.3.4-dev:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:1.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:1.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:1.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:1.3.6-dev:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:1.3.6-dev:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:1.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:1.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:portable_runtime:1.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:portable_runtime:1.3.8:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 19-09-2017 - 01:29)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
oval via4
  • accepted 2014-07-14T04:01:29.175-04:00
    class vulnerability
    contributors
    • name J. Daniel Brown
      organization DTCC
    • name Mike Lah
      organization The MITRE Corporation
    • name Shane Shaffer
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    definition_extensions
    comment Apache HTTP Server 2.2.x is installed on the system
    oval oval:org.mitre.oval:def:8550
    description Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.
    family windows
    id oval:org.mitre.oval:def:8394
    status accepted
    submitted 2010-03-08T17:30:00.000-05:00
    title Apache APR and APR-util Multiple Integer Overflow Vulnerabilities
    version 11
  • accepted 2013-04-29T04:23:38.426-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description leading to buffer overflows. NOTE: some of these details are obtained from third party information.
    family unix
    id oval:org.mitre.oval:def:9958
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title overflows. NOTE: some of these details are obtained from third party information.
    version 24
redhat via4
advisories
  • bugzilla
    id 515698
    title CVE-2009-2412 apr, apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management
    oval
    OR
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304001
      • OR
        • AND
          • comment apr is earlier than 0:0.9.4-24.9.el4_8.2
            oval oval:com.redhat.rhsa:tst:20091204002
          • comment apr is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20091204003
        • AND
          • comment apr-devel is earlier than 0:0.9.4-24.9.el4_8.2
            oval oval:com.redhat.rhsa:tst:20091204004
          • comment apr-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20091204005
        • AND
          • comment apr-util is earlier than 0:0.9.4-22.el4_8.2
            oval oval:com.redhat.rhsa:tst:20091204006
          • comment apr-util is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20091107003
        • AND
          • comment apr-util-devel is earlier than 0:0.9.4-22.el4_8.2
            oval oval:com.redhat.rhsa:tst:20091204008
          • comment apr-util-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20091107005
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331001
      • OR
        • AND
          • comment apr is earlier than 0:1.2.7-11.el5_3.1
            oval oval:com.redhat.rhsa:tst:20091204011
          • comment apr is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091204012
        • AND
          • comment apr-devel is earlier than 0:1.2.7-11.el5_3.1
            oval oval:com.redhat.rhsa:tst:20091204013
          • comment apr-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091204014
        • AND
          • comment apr-docs is earlier than 0:1.2.7-11.el5_3.1
            oval oval:com.redhat.rhsa:tst:20091204015
          • comment apr-docs is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091204016
        • AND
          • comment apr-util is earlier than 0:1.2.7-7.el5_3.2
            oval oval:com.redhat.rhsa:tst:20091204017
          • comment apr-util is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091107008
        • AND
          • comment apr-util-devel is earlier than 0:1.2.7-7.el5_3.2
            oval oval:com.redhat.rhsa:tst:20091204021
          • comment apr-util-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091107010
        • AND
          • comment apr-util-docs is earlier than 0:1.2.7-7.el5_3.2
            oval oval:com.redhat.rhsa:tst:20091204019
          • comment apr-util-docs is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091107012
    rhsa
    id RHSA-2009:1204
    released 2009-08-10
    severity Moderate
    title RHSA-2009:1204: apr and apr-util security update (Moderate)
  • bugzilla
    id 515698
    title CVE-2009-2412 apr, apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management
    oval
    AND
    • comment Red Hat Enterprise Linux 3 is installed
      oval oval:com.redhat.rhba:tst:20070026001
    • OR
      • AND
        • comment httpd is earlier than 0:2.0.46-75.ent
          oval oval:com.redhat.rhsa:tst:20091205002
        • comment httpd is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060619003
      • AND
        • comment httpd-devel is earlier than 0:2.0.46-75.ent
          oval oval:com.redhat.rhsa:tst:20091205004
        • comment httpd-devel is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060619005
      • AND
        • comment mod_ssl is earlier than 0:2.0.46-75.ent
          oval oval:com.redhat.rhsa:tst:20091205006
        • comment mod_ssl is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060619009
    rhsa
    id RHSA-2009:1205
    released 2009-08-10
    severity Moderate
    title RHSA-2009:1205: httpd security and bug fix update (Moderate)
rpms
  • apr-0:0.9.4-24.9.el4_8.2
  • apr-devel-0:0.9.4-24.9.el4_8.2
  • apr-util-0:0.9.4-22.el4_8.2
  • apr-util-devel-0:0.9.4-22.el4_8.2
  • apr-0:1.2.7-11.el5_3.1
  • apr-devel-0:1.2.7-11.el5_3.1
  • apr-docs-0:1.2.7-11.el5_3.1
  • apr-util-0:1.2.7-7.el5_3.2
  • apr-util-devel-0:1.2.7-7.el5_3.2
  • apr-util-docs-0:1.2.7-7.el5_3.2
  • httpd-0:2.0.46-75.ent
  • httpd-devel-0:2.0.46-75.ent
  • mod_ssl-0:2.0.46-75.ent
refmap via4
aixapar
  • PK93225
  • PK99482
apple APPLE-SA-2009-11-09-1
bid 35949
confirm
fedora
  • FEDORA-2009-8336
  • FEDORA-2009-8360
mandriva MDVSA-2009:195
osvdb
  • 56765
  • 56766
secunia
  • 36138
  • 36140
  • 36166
  • 36233
  • 37152
  • 37221
suse
  • SUSE-SA:2009:050
  • SUSE-SR:2010:011
ubuntu USN-813-2
vupen
  • ADV-2009-3184
  • ADV-2010-1107
Last major update 19-09-2017 - 01:29
Published 06-08-2009 - 15:30
Back to Top