CVE-2009-2412
Published Aug 6, 2009
Last updated a year ago
Overview
- Description
- Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-189
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:apr-util:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EC87975-74CA-42E6-84ED-0DD2BF9FFC78" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A896FA5-D3FC-4BD9-965A-C9A72D62780D" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.2-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC4D99D-9753-4C59-BBB5-959D42382DD5" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8EDB1D0-82A9-462F-9B3B-0EDF452341E2" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.3-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A8DC96A-6D25-4E98-808E-5159F8369224" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9DFFEDC-F5C7-47C7-95A9-6BF4208A1B48" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E87B09F2-ECEA-409D-B27B-0747280D4AC6" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "126268B4-03AF-46B1-9840-80CB461429E1" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.7-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9A6CE4A-9BA3-4936-B9EA-B8B649B3AF84" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0760EF10-E57D-42C6-AB26-9FCFAE40062F" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC6D2840-FF47-470F-B124-743592A6B465" }, { "criteria": "cpe:2.3:a:apache:apr-util:0.9.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56723D23-E6BC-4BB6-931E-5802528BE4A4" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E706184-E7BC-452F-82FE-72EA8C37F4D6" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "867962AD-8EF4-4DC4-96F6-77896CEF3F92" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EB78030-8C3B-4ACA-B62B-DC5DC5FBD073" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E53CBDDE-D914-49A8-B65C-9352487B3CBA" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3C48811-5237-4752-857E-AEA5E879505A" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.4-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88051185-C7B3-4540-BE0D-47B34FA4EC3C" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC3307A0-BCD6-423F-AC32-2E4F1E1310F6" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA93EC05-1936-4A2A-BFE1-E3F3BA2FD20F" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.6-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC4B4907-8186-487C-97E8-A00BEC3D8116" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E3B4C44-163C-4D92-9BB0-C3BEC4F65665" }, { "criteria": "cpe:2.3:a:apache:apr-util:1.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EBD5602-6DE8-47EC-8464-150D2AA562BC" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAC9B4C4-ABC3-4306-A207-41E43B1BE20F" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "802A56B5-E4CC-49ED-A5EF-7F1BECBA2811" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.2-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86D62910-DF77-4DA5-B2E0-9C645DE21FE8" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55CEAFE5-CD77-48C4-8B5E-A4FA173D5590" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.3-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18A3B6CD-8D8A-47F1-8021-3779F3882E4F" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C4C28F7-946E-4A8A-8D02-1166EE14E891" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "280DCE6C-A529-4B61-80E4-D0C66D1FA709" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8ECEA4AB-80B3-4E4D-A634-6A37E0C7A1F9" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57DE26CB-8B98-4ADE-A9A5-8DC3020D03FA" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.7-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7686BB5B-9DD3-43DF-8852-2721D158AC81" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4A13FE2-5580-446F-9963-DB978B97BCA6" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F66FC842-29BD-4889-8436-D4BE271CE0AC" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:0.9.16-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97664E40-9802-4FFE-9AD1-78CE05B82FEB" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB66AD7D-FF60-4320-A8AF-448836E61FBB" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A42AC519-7FB4-4911-BA47-9CC87D0EA874" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFE38C6B-4042-4A01-9686-8CD38C995C80" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "910818CC-6EED-4E78-B85C-51AAC3A945D5" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:1.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C8176D3-0632-4D2C-B992-8FE32B023B45" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:1.3.4-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D1F3F02-BED5-42D6-92D9-AA0A5336F1D9" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:1.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25BE556A-5036-4CCC-A597-CA1FC1F89B11" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:1.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99A5A93F-2BD6-4DAE-854F-8CF4FC32C6C3" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:1.3.6-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C35911DF-832A-417D-92C4-5DF02E5EC164" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:1.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A93F3369-74F6-49D0-94A3-C20603C43B08" }, { "criteria": "cpe:2.3:a:apache:portable_runtime:1.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA090A3B-F678-4078-9B7A-6BF3E88F4F0A" } ], "operator": "OR" } ] } ]