Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-2412

Опубликовано: 06 авг. 2009
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 10

Описание

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

РелизСтатусПримечание
dapper

released

2.0.55-4ubuntu2.7
devel

not-affected

hardy

not-affected

intrepid

not-affected

jaunty

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

1.2.11-1ubuntu0.1
intrepid

released

1.2.12-4ubuntu0.1
jaunty

released

1.2.12-5ubuntu0.1
upstream

released

1.3.8-1

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

1.2.12+dfsg-3ubuntu0.2
intrepid

released

1.2.12+dfsg-7ubuntu0.3
jaunty

released

1.2.12+dfsg-8ubuntu0.3
upstream

released

1.3.9+dfsg-1

Показывать по

EPSS

Процентиль: 90%
0.05557
Низкий

10 Critical

CVSS2

Связанные уязвимости

redhat
почти 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

nvd
почти 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

debian
почти 16 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) librar ...

github
около 3 лет назад

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

oracle-oval
почти 16 лет назад

ELSA-2009-1204: apr and apr-util security update (MODERATE)

EPSS

Процентиль: 90%
0.05557
Низкий

10 Critical

CVSS2