Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-1204

Опубликовано: 10 авг. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-1204: apr and apr-util security update (MODERATE)

apr:

[1.2.7-11.1]

  • add security fix for CVE-2009-2412 (#515709)

apr-util:

[1.2.7-7.el5_3.2]

  • add security fix for CVE-2009-2412 (#515713)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

apr

1.2.7-11.el5_3.1

apr-devel

1.2.7-11.el5_3.1

apr-docs

1.2.7-11.el5_3.1

apr-util

1.2.7-7.el5_3.2

apr-util-devel

1.2.7-7.el5_3.2

apr-util-docs

1.2.7-7.el5_3.2

Oracle Linux x86_64

apr

1.2.7-11.el5_3.1

apr-devel

1.2.7-11.el5_3.1

apr-docs

1.2.7-11.el5_3.1

apr-util

1.2.7-7.el5_3.2

apr-util-devel

1.2.7-7.el5_3.2

apr-util-docs

1.2.7-7.el5_3.2

Oracle Linux i386

apr

1.2.7-11.el5_3.1

apr-devel

1.2.7-11.el5_3.1

apr-docs

1.2.7-11.el5_3.1

apr-util

1.2.7-7.el5_3.2

apr-util-devel

1.2.7-7.el5_3.2

apr-util-docs

1.2.7-7.el5_3.2

Связанные CVE

Связанные уязвимости

ubuntu
почти 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

redhat
почти 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

nvd
почти 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

debian
почти 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) librar ...

github
около 3 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.