Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2009-1956 First vendor Publication 2009-06-07
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:P)
Cvss Base Score 6.4 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-189 Numeric Errors (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11567
 
Oval ID: oval:org.mitre.oval:def:11567
Title: Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
Description: Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
Family: unix Class: vulnerability
Reference(s): CVE-2009-1956
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12237
 
Oval ID: oval:org.mitre.oval:def:12237
Title: HP-UX Apache-based Web Server, Local Information Disclosure, Increase of Privilege, Remote Denial of Service (DoS)
Description: Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
Family: unix Class: vulnerability
Reference(s): CVE-2009-1956
Version: 12
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13719
 
Oval ID: oval:org.mitre.oval:def:13719
Title: USN-786-1 -- apr-util vulnerabilities
Description: Matthew Palmer discovered an underflow flaw in apr-util. An attacker could cause a denial of service via application crash in Apache using a crafted SVNMasterURI directive, .htaccess file, or when using mod_apreq2. Applications using libapreq2 are also affected. It was discovered that the XML parser did not properly handle entity expansion. A remote attacker could cause a denial of service via memory resource consumption by sending a crafted request to an Apache server configured to use mod_dav or mod_dav_svn. C. Michael Pilato discovered an off-by-one buffer overflow in apr-util when formatting certain strings. For big-endian machines, a remote attacker could cause a denial of service or information disclosure leak. All other architectures for Ubuntu are not considered to be at risk
Family: unix Class: patch
Reference(s): USN-786-1
CVE-2009-0023
CVE-2009-1955
CVE-2009-1956
Version: 5
Platform(s): Ubuntu 8.10
Ubuntu 8.04
Ubuntu 9.04
Product(s): apr-util
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13813
 
Oval ID: oval:org.mitre.oval:def:13813
Title: USN-787-1 -- apache2 vulnerabilities
Description: Matthew Palmer discovered an underflow flaw in apr-util as included in Apache. An attacker could cause a denial of service via application crash in Apache using a crafted SVNMasterURI directive, .htaccess file, or when using mod_apreq2. This issue only affected Ubuntu 6.06 LTS. Sander de Boer discovered that mod_proxy_ajp would reuse connections when a client closed a connection without sending a request body. A remote attacker could exploit this to obtain sensitive response data. This issue only affected Ubuntu 9.04. Jonathan Peatfield discovered that Apache did not process Includes options correctly. With certain configurations of Options and AllowOverride, a local attacker could use an .htaccess file to override intended restrictions and execute arbitrary code via a Server-Side-Include file. This issue affected Ubuntu 8.04 LTS, 8.10 and 9.04. It was discovered that the XML parser did not properly handle entity expansion. A remote attacker could cause a denial of service via memory resource consumption by sending a crafted request to an Apache server configured to use mod_dav or mod_dav_svn. This issue only affected Ubuntu 6.06 LTS. C. Michael Pilato discovered an off-by-one buffer overflow in apr-util when formatting certain strings. For big-endian machines, a remote attacker could cause a denial of service or information disclosure leak. All other architectures for Ubuntu are not considered to be at risk. This issue only affected Ubuntu 6.06 LTS
Family: unix Class: patch
Reference(s): USN-787-1
CVE-2009-0023
CVE-2009-1191
CVE-2009-1195
CVE-2009-1955
CVE-2009-1956
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 9.04
Ubuntu 6.06
Ubuntu 8.10
Product(s): apache2
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22801
 
Oval ID: oval:org.mitre.oval:def:22801
Title: ELSA-2009:1107: apr-util security update (Moderate)
Description: Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
Family: unix Class: patch
Reference(s): ELSA-2009:1107-01
CVE-2009-0023
CVE-2009-1955
CVE-2009-1956
Version: 17
Platform(s): Oracle Linux 5
Product(s): apr-util
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:29299
 
Oval ID: oval:org.mitre.oval:def:29299
Title: RHSA-2009:1107 -- apr-util security update (Moderate)
Description: Updated apr-util packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. apr-util is a utility library used with the Apache Portable Runtime (APR). It aims to provide a free library of C data structures and routines. This library contains additional utility interfaces for APR; including support for XML, LDAP, database interfaces, URI parsing, and more.
Family: unix Class: patch
Reference(s): RHSA-2009:1107
CESA-2009:1107-CentOS 5
CVE-2009-0023
CVE-2009-1955
CVE-2009-1956
Version: 3
Platform(s): Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 4
CentOS Linux 5
Product(s): apr-util
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 43
Application 176
Os 4

OpenVAS Exploits

Date Description
2011-08-09 Name : CentOS Update for apr-util CESA-2009:1107 centos5 i386
File : nvt/gb_CESA-2009_1107_apr-util_centos5_i386.nasl
2011-08-09 Name : CentOS Update for httpd CESA-2009:1108 centos3 i386
File : nvt/gb_CESA-2009_1108_httpd_centos3_i386.nasl
2011-01-04 Name : HP-UX Update for Apache-based Web Server HPSBUX02612
File : nvt/gb_hp_ux_HPSBUX02612.nasl
2010-05-12 Name : Mac OS X 10.6.2 Update / Mac OS X Security Update 2009-006
File : nvt/macosx_upd_10_6_2_secupd_2009-006.nasl
2009-12-10 Name : Mandriva Security Advisory MDVSA-2009:314 (apr)
File : nvt/mdksa_2009_314.nasl
2009-10-13 Name : SLES10: Security update for libapr-util1
File : nvt/sles10_libapr-util1.nasl
2009-10-11 Name : SLES11: Security update for libapr-util1
File : nvt/sles11_libapr-util1.nasl
2009-09-02 Name : FreeBSD Ports: apache
File : nvt/freebsd_apache15.nasl
2009-08-17 Name : SuSE Security Summary SUSE-SR:2009:013
File : nvt/suse_sr_2009_013.nasl
2009-07-06 Name : Gentoo Security Advisory GLSA 200907-03 (apr-util)
File : nvt/glsa_200907_03.nasl
2009-06-30 Name : Fedora Core 10 FEDORA-2009-5969 (apr-util)
File : nvt/fcore_2009_5969.nasl
2009-06-30 Name : Fedora Core 9 FEDORA-2009-6014 (apr-util)
File : nvt/fcore_2009_6014.nasl
2009-06-30 Name : Fedora Core 11 FEDORA-2009-6261 (apr-util)
File : nvt/fcore_2009_6261.nasl
2009-06-24 Name : Apache APR-Utils Multiple Denial of Service Vulnerabilities
File : nvt/secpod_apache_apr-utils_mult_dos_vuln_jun09.nasl
2009-06-23 Name : RedHat Security Advisory RHSA-2009:1108
File : nvt/RHSA_2009_1108.nasl
2009-06-23 Name : CentOS Security Advisory CESA-2009:1108 (httpd)
File : nvt/ovcesa2009_1108.nasl
2009-06-23 Name : CentOS Security Advisory CESA-2009:1107 (apr-util)
File : nvt/ovcesa2009_1107.nasl
2009-06-23 Name : RedHat Security Advisory RHSA-2009:1107
File : nvt/RHSA_2009_1107.nasl
2009-06-15 Name : Ubuntu USN-786-1 (apr-util)
File : nvt/ubuntu_786_1.nasl
2009-06-15 Name : Ubuntu USN-787-1 (apache2)
File : nvt/ubuntu_787_1.nasl
2009-06-09 Name : Mandrake Security Advisory MDVSA-2009:131-1 (apr-util)
File : nvt/mdksa_2009_131_1.nasl
2009-06-09 Name : Mandrake Security Advisory MDVSA-2009:131 (apr-util)
File : nvt/mdksa_2009_131.nasl
2009-06-09 Name : FreeBSD Ports: apr
File : nvt/freebsd_apr.nasl
0000-00-00 Name : Slackware Advisory SSA:2009-214-01 httpd
File : nvt/esoft_slk_ssa_2009_214_01.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
55058 Apache APR-util apr_brigade_vprintf Function Crafted Input Off-by-one Remote DoS

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2009-1108.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2009-1107.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20090616_httpd_on_SL3_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20090616_apr_util_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2010-01-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2009-1107.nasl - Type : ACT_GATHER_INFO
2009-12-04 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2009-314.nasl - Type : ACT_GATHER_INFO
2009-11-09 Name : The remote host is missing a Mac OS X update that fixes various security issues.
File : macosx_10_6_2.nasl - Type : ACT_GATHER_INFO
2009-11-09 Name : The remote host is missing a Mac OS X update that fixes various security issues.
File : macosx_SecUpd2009-006.nasl - Type : ACT_GATHER_INFO
2009-10-06 Name : The remote openSUSE host is missing a security update.
File : suse_libapr-util1-6288.nasl - Type : ACT_GATHER_INFO
2009-09-24 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_libapr-util1-6289.nasl - Type : ACT_GATHER_INFO
2009-09-24 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_libapr-util1-090608.nasl - Type : ACT_GATHER_INFO
2009-09-23 Name : The remote application server is affected by multiple vulnerabilities.
File : websphere_6_1_0_27.nasl - Type : ACT_GATHER_INFO
2009-08-25 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_e15f2356913911de8f42001aa0166822.nasl - Type : ACT_GATHER_INFO
2009-08-03 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2009-214-01.nasl - Type : ACT_GATHER_INFO
2009-08-02 Name : The remote web server may be affected by several issues.
File : apache_2_2_12.nasl - Type : ACT_GATHER_INFO
2009-07-21 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_libapr-util1-090608.nasl - Type : ACT_GATHER_INFO
2009-07-21 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_libapr-util1-090608.nasl - Type : ACT_GATHER_INFO
2009-07-06 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200907-03.nasl - Type : ACT_GATHER_INFO
2009-06-25 Name : The remote Fedora host is missing a security update.
File : fedora_2009-6261.nasl - Type : ACT_GATHER_INFO
2009-06-25 Name : The remote Fedora host is missing a security update.
File : fedora_2009-6014.nasl - Type : ACT_GATHER_INFO
2009-06-25 Name : The remote Fedora host is missing a security update.
File : fedora_2009-5969.nasl - Type : ACT_GATHER_INFO
2009-06-18 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2009-1108.nasl - Type : ACT_GATHER_INFO
2009-06-17 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2009-1107.nasl - Type : ACT_GATHER_INFO
2009-06-17 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2009-1108.nasl - Type : ACT_GATHER_INFO
2009-06-12 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-787-1.nasl - Type : ACT_GATHER_INFO
2009-06-11 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-786-1.nasl - Type : ACT_GATHER_INFO
2009-06-08 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2009-131.nasl - Type : ACT_GATHER_INFO
2009-06-08 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_eb9212f7526b11debbf2001b77d09812.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://www.mail-archive.com/dev%40apr.apache.org/msg21591.html
http://www.mail-archive.com/dev%40apr.apache.org/msg21592.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5...
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360...
https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e8...
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86...
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b...
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694...
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f...
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20...
https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf...
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5...
https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d00...
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f...
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806ce...
Source Url
AIXAPAR http://www-01.ibm.com/support/docview.wss?uid=swg1PK88341
http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241
http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478
APPLE http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
BID http://www.securityfocus.com/bid/35251
CONFIRM http://support.apple.com/kb/HT3937
http://svn.apache.org/viewvc?view=rev&revision=768417
http://www-01.ibm.com/support/docview.wss?uid=swg27014463
http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3
http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
https://bugzilla.redhat.com/show_bug.cgi?id=504390
FEDORA https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html
GENTOO http://security.gentoo.org/glsa/glsa-200907-03.xml
HP http://marc.info/?l=bugtraq&m=129190899612998&w=2
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2009:131
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
MLIST http://www.openwall.com/lists/oss-security/2009/06/06/1
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2009-1107.html
http://www.redhat.com/support/errata/RHSA-2009-1108.html
SECUNIA http://secunia.com/advisories/34724
http://secunia.com/advisories/35284
http://secunia.com/advisories/35395
http://secunia.com/advisories/35487
http://secunia.com/advisories/35565
http://secunia.com/advisories/35710
http://secunia.com/advisories/35797
http://secunia.com/advisories/35843
http://secunia.com/advisories/37221
UBUNTU http://www.ubuntu.com/usn/usn-786-1
http://www.ubuntu.com/usn/usn-787-1
VUPEN http://www.vupen.com/english/advisories/2009/1907
http://www.vupen.com/english/advisories/2009/3184

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
Date Informations
2024-02-02 01:11:11
  • Multiple Updates
2024-02-01 12:03:07
  • Multiple Updates
2023-11-07 21:47:42
  • Multiple Updates
2023-09-05 12:10:27
  • Multiple Updates
2023-09-05 01:02:58
  • Multiple Updates
2023-09-02 12:10:33
  • Multiple Updates
2023-09-02 01:03:00
  • Multiple Updates
2023-08-12 12:12:25
  • Multiple Updates
2023-08-12 01:02:59
  • Multiple Updates
2023-08-11 12:10:35
  • Multiple Updates
2023-08-11 01:03:06
  • Multiple Updates
2023-08-06 12:10:11
  • Multiple Updates
2023-08-06 01:03:01
  • Multiple Updates
2023-08-04 12:10:16
  • Multiple Updates
2023-08-04 01:03:03
  • Multiple Updates
2023-07-14 12:10:14
  • Multiple Updates
2023-07-14 01:03:01
  • Multiple Updates
2023-03-29 01:11:43
  • Multiple Updates
2023-03-28 12:03:07
  • Multiple Updates
2023-03-03 21:28:01
  • Multiple Updates
2021-06-06 17:23:03
  • Multiple Updates
2021-06-03 13:23:13
  • Multiple Updates
2021-05-05 01:06:14
  • Multiple Updates
2021-05-04 12:10:10
  • Multiple Updates
2021-04-22 01:10:35
  • Multiple Updates
2021-03-30 17:22:47
  • Multiple Updates
2020-10-14 01:04:37
  • Multiple Updates
2020-05-23 01:40:30
  • Multiple Updates
2020-05-23 00:23:53
  • Multiple Updates
2019-08-23 12:01:31
  • Multiple Updates
2017-09-29 09:24:15
  • Multiple Updates
2016-04-26 18:52:50
  • Multiple Updates
2014-02-17 10:50:24
  • Multiple Updates
2013-10-11 13:23:04
  • Multiple Updates
2013-05-10 23:51:58
  • Multiple Updates
2013-04-18 13:19:44
  • Multiple Updates