// For flags

CVE-2009-0023

apr-util heap buffer underwrite

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.

La función apr_strmatch_precompile en strmatch/apr_strmatch.c en Apache APR-util anteriores a v1.3.5 permite a los atacantes remotos causar una denegación de servicio (caída del demonio) a través de una entrada manipulada en 1) un fichero .htaccess utilizado con el Servidor Apache HTTP, (2) la directiva SVNMasterURI en el módulo mod_dav_svn en el Servidor Apache HTTP, (3) el módulo mod_apreq2 para el Servidor Apache HTTP, o (4) una aplicación que utiliza la librería libapreq2, relativa a un "bandera de desbordamiento inferior".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
Attack Vector
Local
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-12-15 CVE Reserved
  • 2009-06-05 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-11-09 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (57)
URL Tag Source
http://secunia.com/advisories/34724 Third Party Advisory
http://secunia.com/advisories/35395 Third Party Advisory
http://secunia.com/advisories/35444 Third Party Advisory
http://secunia.com/advisories/35487 Third Party Advisory
http://secunia.com/advisories/35565 Third Party Advisory
http://secunia.com/advisories/35710 Third Party Advisory
http://secunia.com/advisories/35797 Third Party Advisory
http://secunia.com/advisories/35843 Third Party Advisory
http://secunia.com/advisories/37221 Third Party Advisory
http://support.apple.com/kb/HT3937 Third Party Advisory
http://svn.apache.org/viewvc?view=rev&revision=779880 Third Party Advisory
http://wiki.rpath.com/Advisories:rPSA-2009-0144 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg27014463 Third Party Advisory
http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html Third Party Advisory
http://www.securityfocus.com/archive/1/507855/100/0/threaded Mailing List
http://www.securityfocus.com/bid/35221 Third Party Advisory
http://www.vupen.com/english/advisories/2009/1907 Third Party Advisory
http://www.vupen.com/english/advisories/2009/3184 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/50964 Third Party Advisory
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10968 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12321 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
<= 1.3.4
Search vendor "Apache" for product "Apr-util" and version " <= 1.3.4"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
0.9.1
Search vendor "Apache" for product "Apr-util" and version "0.9.1"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
0.9.2
Search vendor "Apache" for product "Apr-util" and version "0.9.2"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
0.9.3
Search vendor "Apache" for product "Apr-util" and version "0.9.3"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
0.9.4
Search vendor "Apache" for product "Apr-util" and version "0.9.4"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
0.9.5
Search vendor "Apache" for product "Apr-util" and version "0.9.5"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.0
Search vendor "Apache" for product "Apr-util" and version "1.0"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.0.1
Search vendor "Apache" for product "Apr-util" and version "1.0.1"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.0.2
Search vendor "Apache" for product "Apr-util" and version "1.0.2"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.1.0
Search vendor "Apache" for product "Apr-util" and version "1.1.0"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.1.1
Search vendor "Apache" for product "Apr-util" and version "1.1.1"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.1.2
Search vendor "Apache" for product "Apr-util" and version "1.1.2"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.2.1
Search vendor "Apache" for product "Apr-util" and version "1.2.1"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.2.2
Search vendor "Apache" for product "Apr-util" and version "1.2.2"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.2.6
Search vendor "Apache" for product "Apr-util" and version "1.2.6"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.2.7
Search vendor "Apache" for product "Apr-util" and version "1.2.7"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.2.8
Search vendor "Apache" for product "Apr-util" and version "1.2.8"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.3.0
Search vendor "Apache" for product "Apr-util" and version "1.3.0"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.3.1
Search vendor "Apache" for product "Apr-util" and version "1.3.1"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.3.2
Search vendor "Apache" for product "Apr-util" and version "1.3.2"
-
Affected
Apache
Search vendor "Apache"
Apr-util
Search vendor "Apache" for product "Apr-util"
1.3.3
Search vendor "Apache" for product "Apr-util" and version "1.3.3"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
>= 2.2.0 < 2.2.12
Search vendor "Apache" for product "Http Server" and version " >= 2.2.0 < 2.2.12"
-
Affected