ID CVE-2017-12618
Summary Apache Portable Runtime Utility (APR-util) 1.6.0 and prior fail to validate the integrity of SDBM database files used by apr_sdbm*() functions, resulting in a possible out of bound read access. A local user with write access to the database can make a program or process using these functions crash, and cause a denial of service.
References
Vulnerable Configurations
  • Apache Software Foundation Portable Runtime Utility 0.9.1
    cpe:2.3:a:apache:portable_runtime_utility:0.9.1
  • Apache Software Foundation Portable Runtime Utility 0.9.2
    cpe:2.3:a:apache:portable_runtime_utility:0.9.2
  • Apache Software Foundation Portable Runtime Utility 0.9.3
    cpe:2.3:a:apache:portable_runtime_utility:0.9.3
  • Apache Software Foundation Portable Runtime Utility 0.9.4
    cpe:2.3:a:apache:portable_runtime_utility:0.9.4
  • Apache Software Foundation Portable Runtime Utility 0.9.5
    cpe:2.3:a:apache:portable_runtime_utility:0.9.5
  • Apache Software Foundation Portable Runtime Utility 0.9.6
    cpe:2.3:a:apache:portable_runtime_utility:0.9.6
  • Apache Software Foundation Portable Runtime Utility 0.9.7
    cpe:2.3:a:apache:portable_runtime_utility:0.9.7
  • Apache Software Foundation Portable Runtime Utility 0.9.9
    cpe:2.3:a:apache:portable_runtime_utility:0.9.9
  • Apache Software Foundation Portable Runtime Utility 0.9.10
    cpe:2.3:a:apache:portable_runtime_utility:0.9.10
  • Apache Software Foundation Portable Runtime Utility 0.9.11
    cpe:2.3:a:apache:portable_runtime_utility:0.9.11
  • Apache Software Foundation Portable Runtime Utility 0.9.12
    cpe:2.3:a:apache:portable_runtime_utility:0.9.12
  • Apache Software Foundation Portable Runtime Utility 0.9.13
    cpe:2.3:a:apache:portable_runtime_utility:0.9.13
  • Apache Software Foundation Portable Runtime Utility 0.9.14
    cpe:2.3:a:apache:portable_runtime_utility:0.9.14
  • Apache Software Foundation Portable Runtime Utility 0.9.15
    cpe:2.3:a:apache:portable_runtime_utility:0.9.15
  • Apache Software Foundation Portable Runtime Utility 0.9.16
    cpe:2.3:a:apache:portable_runtime_utility:0.9.16
  • Apache Software Foundation Portable Runtime Utility 0.9.17
    cpe:2.3:a:apache:portable_runtime_utility:0.9.17
  • Apache Software Foundation Portable Runtime Utility 0.9.18
    cpe:2.3:a:apache:portable_runtime_utility:0.9.18
  • Apache Software Foundation Portable Runtime Utility 0.9.19
    cpe:2.3:a:apache:portable_runtime_utility:0.9.19
  • Apache Software Foundation Portable Runtime Utility 0.9.20
    cpe:2.3:a:apache:portable_runtime_utility:0.9.20
  • Apache Software Foundation Portable Runtime Utility 1.0.0
    cpe:2.3:a:apache:portable_runtime_utility:1.0.0
  • Apache Software Foundation Portable Runtime Utility 1.0.1
    cpe:2.3:a:apache:portable_runtime_utility:1.0.1
  • Apache Software Foundation Portable Runtime Utility 1.0.2
    cpe:2.3:a:apache:portable_runtime_utility:1.0.2
  • Apache Software Foundation Portable Runtime Utility 1.1.0
    cpe:2.3:a:apache:portable_runtime_utility:1.1.0
  • Apache Software Foundation Portable Runtime Utility 1.1.1
    cpe:2.3:a:apache:portable_runtime_utility:1.1.1
  • Apache Software Foundation Portable Runtime Utility 1.1.2
    cpe:2.3:a:apache:portable_runtime_utility:1.1.2
  • Apache Software Foundation Portable Runtime Utility 1.2.1
    cpe:2.3:a:apache:portable_runtime_utility:1.2.1
  • Apache Software Foundation Portable Runtime Utility 1.2.2
    cpe:2.3:a:apache:portable_runtime_utility:1.2.2
  • Apache Software Foundation Portable Runtime Utility 1.2.6
    cpe:2.3:a:apache:portable_runtime_utility:1.2.6
  • Apache Software Foundation Portable Runtime Utility 1.2.7
    cpe:2.3:a:apache:portable_runtime_utility:1.2.7
  • Apache Software Foundation Portable Runtime Utility 1.2.8
    cpe:2.3:a:apache:portable_runtime_utility:1.2.8
  • Apache Software Foundation Portable Runtime Utility 1.2.9
    cpe:2.3:a:apache:portable_runtime_utility:1.2.9
  • Apache Software Foundation Portable Runtime Utility 1.2.10
    cpe:2.3:a:apache:portable_runtime_utility:1.2.10
  • Apache Software Foundation Portable Runtime Utility 1.2.12
    cpe:2.3:a:apache:portable_runtime_utility:1.2.12
  • Apache Software Foundation Portable Runtime Utility 1.2.13
    cpe:2.3:a:apache:portable_runtime_utility:1.2.13
  • Apache Software Foundation Portable Runtime Utility 1.3.0
    cpe:2.3:a:apache:portable_runtime_utility:1.3.0
  • Apache Software Foundation Portable Runtime Utility 1.3.1
    cpe:2.3:a:apache:portable_runtime_utility:1.3.1
  • Apache Software Foundation Portable Runtime Utility 1.3.2
    cpe:2.3:a:apache:portable_runtime_utility:1.3.2
  • Apache Software Foundation Portable Runtime Utility 1.3.3
    cpe:2.3:a:apache:portable_runtime_utility:1.3.3
  • Apache Software Foundation Portable Runtime Utility 1.3.4
    cpe:2.3:a:apache:portable_runtime_utility:1.3.4
  • Apache Software Foundation Portable Runtime Utility 1.3.5
    cpe:2.3:a:apache:portable_runtime_utility:1.3.5
  • Apache Software Foundation Portable Runtime Utility 1.3.6
    cpe:2.3:a:apache:portable_runtime_utility:1.3.6
  • Apache Software Foundation Portable Runtime Utility 1.3.7
    cpe:2.3:a:apache:portable_runtime_utility:1.3.7
  • Apache Software Foundation Portable Runtime Utility 1.3.8
    cpe:2.3:a:apache:portable_runtime_utility:1.3.8
  • Apache Software Foundation Portable Runtime Utility 1.3.9
    cpe:2.3:a:apache:portable_runtime_utility:1.3.9
  • Apache Software Foundation Portable Runtime Utility 1.3.10
    cpe:2.3:a:apache:portable_runtime_utility:1.3.10
  • Apache Software Foundation Portable Runtime Utility 1.3.11
    cpe:2.3:a:apache:portable_runtime_utility:1.3.11
  • Apache Software Foundation Portable Runtime Utility 1.3.12
    cpe:2.3:a:apache:portable_runtime_utility:1.3.12
  • Apache Software Foundation Portable Runtime Utility 1.3.13
    cpe:2.3:a:apache:portable_runtime_utility:1.3.13
  • Apache Software Foundation Portable Runtime Utility 1.4.0
    cpe:2.3:a:apache:portable_runtime_utility:1.4.0
  • Apache Software Foundation Portable Runtime Utility 1.4.1
    cpe:2.3:a:apache:portable_runtime_utility:1.4.1
  • Apache Software Foundation Portable Runtime Utility 1.4.2
    cpe:2.3:a:apache:portable_runtime_utility:1.4.2
  • Apache Software Foundation Portable Runtime Utility 1.4.3
    cpe:2.3:a:apache:portable_runtime_utility:1.4.3
  • Apache Software Foundation Portable Runtime Utility 1.5.0
    cpe:2.3:a:apache:portable_runtime_utility:1.5.0
  • Apache Software Foundation Portable Runtime Utility 1.5.1
    cpe:2.3:a:apache:portable_runtime_utility:1.5.1
  • Apache Software Foundation Portable Runtime Utility 1.5.2
    cpe:2.3:a:apache:portable_runtime_utility:1.5.2
  • Apache Software Foundation Portable Runtime Utility 1.5.3
    cpe:2.3:a:apache:portable_runtime_utility:1.5.3
  • Apache Software Foundation Portable Runtime Utility 1.5.4
    cpe:2.3:a:apache:portable_runtime_utility:1.5.4
  • Apache Software Foundation Portable Runtime Utility 1.5.5
    cpe:2.3:a:apache:portable_runtime_utility:1.5.5
  • Apache Software Foundation Portable Runtime Utility 1.6.0
    cpe:2.3:a:apache:portable_runtime_utility:1.6.0
CVSS
Base: 1.9
Impact:
Exploitability:
CWE CWE-125
CAPEC
  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
nessus via4
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1163.NASL
    description It was discovered that there was an out-of-bounds read access in apr-util, a support/portability library used by many applications. A local user with write access to the database could have made a process using these functions crash and thus cause a denial of service. For Debian 7 'Wheezy', this issue has been fixed in apr-util version 1.4.1-3+deb7u1. We recommend that you upgrade your apr-util packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-09
    plugin id 104413
    published 2017-11-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=104413
    title Debian DLA-1163-1 : apr-util security update
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-1370.NASL
    description This update for libapr-util1 fixes the following issues : Security issue fixed : - CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990) This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2019-02-21
    modified 2018-01-26
    plugin id 105265
    published 2017-12-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105265
    title openSUSE Security Update : libapr-util1 (openSUSE-2017-1370)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-329E5FB4C9.NASL
    description Security fix Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-02-01
    plugin id 104593
    published 2017-11-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=104593
    title Fedora 26 : apr-util (2017-329e5fb4c9)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2018-005.NASL
    description The remote host is running Mac OS X 10.12.6 and is missing a security update. It is therefore, affected by multiple vulnerabilities affecting the following components : - afpserver - AppleGraphicsControl - APR - ATS - CFNetwork - CoreAnimation - CoreCrypto - CoreFoundation - CUPS - Dictionary - dyld - Foundation - Heimdal - Hypervisor - ICU - Intel Graphics Driver - IOGraphics - IOHIDFamily - IOKit - IOUserEthernet - IPSec - Kernel - Login Window - mDNSOffloadUserClient - MediaRemote - Microcode - Perl - Ruby - Security - Spotlight - Symptom Framework - WiFi
    last seen 2019-02-21
    modified 2019-01-09
    plugin id 118573
    published 2018-10-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118573
    title macOS and Mac OS X Multiple Vulnerabilities (Security Update 2018-005)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-3278-1.NASL
    description This update for libapr-util1 fixes the following issues: Security issue fixed : - CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-30
    plugin id 105253
    published 2017-12-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105253
    title SUSE SLES12 Security Update : libapr-util1 (SUSE-SU-2017:3278-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-0307-1.NASL
    description This update for libapr-util1 fixes the following issues: Security issue fixed : - CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 106532
    published 2018-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=106532
    title SUSE SLES11 Security Update : libapr-util1 (SUSE-SU-2018:0307-1)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2017-929.NASL
    description Apache Portable Runtime Utility (APR-util) fails to validate the integrity of SDBM database files used by apr_sdbm*() functions, resulting in a possible out of bound read access. A local user with write access to the database can make a program or process using these functions crash, and cause a denial of service.(CVE-2017-12618)
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 105053
    published 2017-12-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105053
    title Amazon Linux AMI : apr-util (ALAS-2017-929)
  • NASL family MacOS X Local Security Checks
    NASL id MACOS_10_14.NASL
    description The remote host is running a version of Mac OS X that is prior to 10.13.6 or is not macOS 10.14. It is, therefore, affected by multiple vulnerabilities in the following components : - afpserver - AppleGraphicsControl - Application Firewall - App Store - APR - ATS - Auto Unlock - Bluetooth - CFNetwork - CoreFoundation - CoreText - Crash Reporter - CUPS - Dictionary - Grand Central Dispatch - Heimdal - Hypervisor - iBooks - Intel Graphics Driver - IOHIDFamily - IOKit - IOUserEthernet - Kernel - LibreSSL - Login Window - mDNSOffloadUserClient - MediaRemote - Microcode - Security - Spotlight - Symptom Framework - Text - Wi-Fi Note that successful exploitation of the most serious issues can result in arbitrary code execution.
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 118178
    published 2018-10-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118178
    title macOS < 10.14 Multiple Vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD_10_13_6_2018-002.NASL
    description The remote host is running macOS 10.13.6 and is missing a security update. It is therefore, affected by multiple vulnerabilities affecting the following components : - fpserver - AppleGraphicsControl - APR - ATS - CFNetwork - CoreAnimation - CoreCrypto - CoreFoundation - CUPS - Dictionary - dyld - EFI - Foundation - Grand Central Dispatch - Heimdal - Hypervisor - ICU - Intel Graphics Driver - IOGraphics - IOHIDFamily - IOKit - IOUserEthernet - IPSec - Kernel - Login Window - mDNSOffloadUserClient - MediaRemote - Microcode - NetworkExtension - Security - Spotlight - Symptom Framework - WiFi
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 118575
    published 2018-10-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118575
    title macOS 10.13.6 Multiple Vulnerabilities (Security Update 2018-002)
refmap via4
bid 101558
mlist
  • [announce] 20171023 Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released
  • [debian-lts-announce] 20171106 [SECURITY] [DLA 1163-1] apr-util security update
sectrack 1042004
Last major update 23-10-2017 - 21:29
Published 23-10-2017 - 21:29
Last modified 31-10-2018 - 06:29
Back to Top