Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-03046

Опубликовано: 28 июл. 2006
Источник: fstec
CVSS2: 7.6
EPSS Критический

Описание

Множественные уязвимости пакета libapr0 операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 3.1 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,6)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 3.1:
ppc:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1
s390x:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1
m68k:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1
i686:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1
arm:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1
sparc:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1
x86-64:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1
alpha:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1
ia64:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1
mips:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1
noarch:
apache2-doc - 2.0.54-5sarge1
apache2-mpm-threadpool - 2.0.54-5sarge1
mipsel:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1
hppa:
apache2 - 2.0.54-5sarge1
apache2-common - 2.0.54-5sarge1
apache2-mpm-perchild - 2.0.54-5sarge1
apache2-mpm-prefork - 2.0.54-5sarge1
apache2-mpm-worker - 2.0.54-5sarge1
apache2-prefork-dev - 2.0.54-5sarge1
apache2-threaded-dev - 2.0.54-5sarge1
apache2-utils - 2.0.54-5sarge1
libapr0 - 2.0.54-5sarge1
libapr0-dev - 2.0.54-5sarge1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 100%
0.92418
Критический

7.6 High

CVSS2

Связанные уязвимости

ubuntu
около 19 лет назад

Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.

nvd
около 19 лет назад

Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.

debian
около 19 лет назад

Off-by-one error in the ldap scheme handling in the Rewrite module (mo ...

github
больше 3 лет назад

Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.

fstec
больше 10 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 100%
0.92418
Критический

7.6 High

CVSS2