Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-1204

Опубликовано: 10 авг. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-1204: apr and apr-util security update (MODERATE)

apr:

[1.2.7-11.1]

  • add security fix for CVE-2009-2412 (#515709)

apr-util:

[1.2.7-7.el5_3.2]

  • add security fix for CVE-2009-2412 (#515713)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

apr

1.2.7-11.el5_3.1

apr-devel

1.2.7-11.el5_3.1

apr-docs

1.2.7-11.el5_3.1

apr-util

1.2.7-7.el5_3.2

apr-util-devel

1.2.7-7.el5_3.2

apr-util-docs

1.2.7-7.el5_3.2

Oracle Linux x86_64

apr

1.2.7-11.el5_3.1

apr-devel

1.2.7-11.el5_3.1

apr-docs

1.2.7-11.el5_3.1

apr-util

1.2.7-7.el5_3.2

apr-util-devel

1.2.7-7.el5_3.2

apr-util-docs

1.2.7-7.el5_3.2

Oracle Linux i386

apr

1.2.7-11.el5_3.1

apr-devel

1.2.7-11.el5_3.1

apr-docs

1.2.7-11.el5_3.1

apr-util

1.2.7-7.el5_3.2

apr-util-devel

1.2.7-7.el5_3.2

apr-util-docs

1.2.7-7.el5_3.2

Связанные CVE

Связанные уязвимости

ubuntu
около 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

redhat
около 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

nvd
около 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

debian
около 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) librar ...

github
больше 3 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.