// For flags

CVE-2009-0023

apr-util heap buffer underwrite

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.

La función apr_strmatch_precompile en strmatch/apr_strmatch.c en Apache APR-util anteriores a v1.3.5 permite a los atacantes remotos causar una denegación de servicio (caída del demonio) a través de una entrada manipulada en 1) un fichero .htaccess utilizado con el Servidor Apache HTTP, (2) la directiva SVNMasterURI en el módulo mod_dav_svn en el Servidor Apache HTTP, (3) el módulo mod_apreq2 para el Servidor Apache HTTP, o (4) una aplicación que utiliza la librería libapreq2, relativa a un "bandera de desbordamiento inferior".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
Attack Vector
Local
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-12-15 CVE Reserved
  • 2009-06-06 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (57)
URL Tag Source
http://secunia.com/advisories/34724 Third Party Advisory
http://secunia.com/advisories/35395 Third Party Advisory
http://secunia.com/advisories/35444 Third Party Advisory
http://secunia.com/advisories/35487 Third Party Advisory
http://secunia.com/advisories/35565 Third Party Advisory
http://secunia.com/advisories/35710 Third Party Advisory
http://secunia.com/advisories/35797 Third Party Advisory
http://secunia.com/advisories/35843 Third Party Advisory
http://secunia.com/advisories/37221 Third Party Advisory
http://support.apple.com/kb/HT3937 Third Party Advisory
http://svn.apache.org/viewvc?view=rev&revision=779880 Third Party Advisory
http://wiki.rpath.com/Advisories:rPSA-2009-0144 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg27014463 Third Party Advisory
http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html Third Party Advisory
http://www.securityfocus.com/archive/1/507855/100/0/threaded Mailing List
http://www.securityfocus.com/bid/35221 Third Party Advisory
http://www.vupen.com/english/advisories/2009/1907 Third Party Advisory
http://www.vupen.com/english/advisories/2009/3184 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/50964 Third Party Advisory
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10968 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12321 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
<= 1.3.4
Search vendor "Apache" for product "Apr-util" and version " <= 1.3.4"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
0.9.1
Search vendor "Apache" for product "Apr-util" and version "0.9.1"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
0.9.2
Search vendor "Apache" for product "Apr-util" and version "0.9.2"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
0.9.3
Search vendor "Apache" for product "Apr-util" and version "0.9.3"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
0.9.4
Search vendor "Apache" for product "Apr-util" and version "0.9.4"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
0.9.5
Search vendor "Apache" for product "Apr-util" and version "0.9.5"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.0
Search vendor "Apache" for product "Apr-util" and version "1.0"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.0.1
Search vendor "Apache" for product "Apr-util" and version "1.0.1"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.0.2
Search vendor "Apache" for product "Apr-util" and version "1.0.2"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.1.0
Search vendor "Apache" for product "Apr-util" and version "1.1.0"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.1.1
Search vendor "Apache" for product "Apr-util" and version "1.1.1"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.1.2
Search vendor "Apache" for product "Apr-util" and version "1.1.2"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.2.1
Search vendor "Apache" for product "Apr-util" and version "1.2.1"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.2.2
Search vendor "Apache" for product "Apr-util" and version "1.2.2"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.2.6
Search vendor "Apache" for product "Apr-util" and version "1.2.6"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.2.7
Search vendor "Apache" for product "Apr-util" and version "1.2.7"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.2.8
Search vendor "Apache" for product "Apr-util" and version "1.2.8"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.3.0
Search vendor "Apache" for product "Apr-util" and version "1.3.0"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.3.1
Search vendor "Apache" for product "Apr-util" and version "1.3.1"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.3.2
Search vendor "Apache" for product "Apr-util" and version "1.3.2"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.3.3
Search vendor "Apache" for product "Apr-util" and version "1.3.3"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
>= 2.2.0 < 2.2.12
Search vendor "Apache" for product "Http Server" and version " >= 2.2.0 < 2.2.12"
-
Affected