Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-03656

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 10
EPSS Низкий

Описание

Множественные уязвимости пакета libapr1-dbg операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 4 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Критический уровень опасности (базовая оценка CVSS 2.0 составляет 10)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 4:
ppc:
libaprutil1-dev - 1.2.7+dfsg-2+etch3
libapr1-dev - 1.2.7-9
libaprutil1-dbg - 1.2.7+dfsg-2+etch3
libapr1-dbg - 1.2.7-9
libapr1 - 1.2.7-9
libaprutil1 - 1.2.7+dfsg-2+etch3
s390x:
libaprutil1-dev - 1.2.7+dfsg-2+etch3
libapr1 - 1.2.7-9
libaprutil1-dbg - 1.2.7+dfsg-2+etch3
libapr1-dbg - 1.2.7-9
libapr1-dev - 1.2.7-9
libaprutil1 - 1.2.7+dfsg-2+etch3
i686:
libaprutil1-dev - 1.2.7+dfsg-2+etch3
libapr1-dev - 1.2.7-9
libaprutil1 - 1.2.7+dfsg-2+etch3
libapr1 - 1.2.7-9
libaprutil1-dbg - 1.2.7+dfsg-2+etch3
libapr1-dbg - 1.2.7-9
arm:
libaprutil1-dbg - 1.2.7+dfsg-2+etch3
libapr1-dbg - 1.2.7-9
libaprutil1-dev - 1.2.7+dfsg-2+etch3
libapr1 - 1.2.7-9
libaprutil1 - 1.2.7+dfsg-2+etch3
libapr1-dev - 1.2.7-9
sparc:
libapr1-dev - 1.2.7-9
libapr1 - 1.2.7-9
libaprutil1-dev - 1.2.7+dfsg-2+etch3
libaprutil1 - 1.2.7+dfsg-2+etch3
libapr1-dbg - 1.2.7-9
libaprutil1-dbg - 1.2.7+dfsg-2+etch3
x86-64:
libaprutil1 - 1.2.7+dfsg-2+etch3
libaprutil1-dev - 1.2.7+dfsg-2+etch3
libaprutil1-dbg - 1.2.7+dfsg-2+etch3
libapr1-dbg - 1.2.7-9
libapr1-dev - 1.2.7-9
libapr1 - 1.2.7-9
alpha:
libapr1 - 1.2.7-9
libaprutil1 - 1.2.7+dfsg-2+etch3
libapr1-dev - 1.2.7-9
libaprutil1-dbg - 1.2.7+dfsg-2+etch3
libapr1-dbg - 1.2.7-9
libaprutil1-dev - 1.2.7+dfsg-2+etch3
ia64:
libaprutil1-dev - 1.2.7+dfsg-2+etch3
libaprutil1 - 1.2.7+dfsg-2+etch3
libapr1 - 1.2.7-9
libaprutil1-dbg - 1.2.7+dfsg-2+etch3
libapr1-dbg - 1.2.7-9
libapr1-dev - 1.2.7-9
mips:
libapr1-dbg - 1.2.7-9
libaprutil1-dbg - 1.2.7+dfsg-2+etch3
libaprutil1-dev - 1.2.7+dfsg-2+etch3
libaprutil1 - 1.2.7+dfsg-2+etch3
libapr1-dev - 1.2.7-9
libapr1 - 1.2.7-9
mipsel:
libapr1-dbg - 1.2.7-9
libaprutil1-dbg - 1.2.7+dfsg-2+etch3
libapr1-dev - 1.2.7-9
libaprutil1-dev - 1.2.7+dfsg-2+etch3
libapr1 - 1.2.7-9
libaprutil1 - 1.2.7+dfsg-2+etch3
hppa:
libaprutil1-dbg - 1.2.7+dfsg-2+etch3
libaprutil1 - 1.2.7+dfsg-2+etch3
libaprutil1-dev - 1.2.7+dfsg-2+etch3
Debian GNU/Linux 5:
ppc:
libaprutil1 - 1.2.12+dfsg-8+lenny4
libapr1-dbg - 1.2.12-5+lenny1
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
libapr1 - 1.2.12-5+lenny1
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
libapr1-dev - 1.2.12-5+lenny1
s390x:
libapr1 - 1.2.12-5+lenny1
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
libapr1-dev - 1.2.12-5+lenny1
libaprutil1 - 1.2.12+dfsg-8+lenny4
libapr1-dbg - 1.2.12-5+lenny1
i686:
libaprutil1 - 1.2.12+dfsg-8+lenny4
libapr1-dbg - 1.2.12-5+lenny1
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
libapr1 - 1.2.12-5+lenny1
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
libapr1-dev - 1.2.12-5+lenny1
arm:
libapr1-dev - 1.2.12-5+lenny1
libapr1-dbg - 1.2.12-5+lenny1
libapr1 - 1.2.12-5+lenny1
libaprutil1 - 1.2.12+dfsg-8+lenny4
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
sparc:
libapr1-dev - 1.2.12-5+lenny1
libapr1-dbg - 1.2.12-5+lenny1
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
libapr1 - 1.2.12-5+lenny1
libaprutil1 - 1.2.12+dfsg-8+lenny4
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
x86-64:
libapr1-dbg - 1.2.12-5+lenny1
libaprutil1 - 1.2.12+dfsg-8+lenny4
libapr1 - 1.2.12-5+lenny1
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
libapr1-dev - 1.2.12-5+lenny1
armel:
libapr1 - 1.2.12-5+lenny1
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
libapr1-dev - 1.2.12-5+lenny1
libapr1-dbg - 1.2.12-5+lenny1
libaprutil1 - 1.2.12+dfsg-8+lenny4
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
alpha:
libapr1-dev - 1.2.12-5+lenny1
libapr1-dbg - 1.2.12-5+lenny1
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
libaprutil1 - 1.2.12+dfsg-8+lenny4
libapr1 - 1.2.12-5+lenny1
ia64:
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
libapr1 - 1.2.12-5+lenny1
libapr1-dev - 1.2.12-5+lenny1
libaprutil1 - 1.2.12+dfsg-8+lenny4
libapr1-dbg - 1.2.12-5+lenny1
mips:
libapr1 - 1.2.12-5+lenny1
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
libapr1-dbg - 1.2.12-5+lenny1
libaprutil1 - 1.2.12+dfsg-8+lenny4
libapr1-dev - 1.2.12-5+lenny1
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
mipsel:
libapr1-dbg - 1.2.12-5+lenny1
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
libaprutil1 - 1.2.12+dfsg-8+lenny4
libapr1-dev - 1.2.12-5+lenny1
libapr1 - 1.2.12-5+lenny1
hppa:
libaprutil1 - 1.2.12+dfsg-8+lenny4
libapr1-dev - 1.2.12-5+lenny1
libaprutil1-dbg - 1.2.12+dfsg-8+lenny4
libaprutil1-dev - 1.2.12+dfsg-8+lenny4
libapr1 - 1.2.12-5+lenny1
libapr1-dbg - 1.2.12-5+lenn

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 90%
0.05557
Низкий

10 Critical

CVSS2

Связанные уязвимости

ubuntu
почти 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

redhat
почти 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

nvd
почти 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

debian
почти 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) librar ...

github
около 3 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 90%
0.05557
Низкий

10 Critical

CVSS2