exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

CVE-2009-0023

Status Candidate

Overview

The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.

Related Files

HP Security Bulletin HPSBUX02612 SSRT100345
Posted Dec 9, 2010
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02612 SSRT100345 - Potential security vulnerabilities have been identified with HP-UX Apache-based Web Server. These vulnerabilities could be exploited locally to disclose information, increase privilege or remotely create a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, web, denial of service, vulnerability
systems | hpux
advisories | CVE-2010-1452, CVE-2009-1956, CVE-2009-1955, CVE-2009-1891, CVE-2009-1890, CVE-2009-1195, CVE-2009-0023, CVE-2007-6203, CVE-2006-3918
SHA-256 | b1f190998016e144317781b119e85f9b8dd0c136204c8fe53bffb4d260a8e398
Mandriva Linux Security Advisory 2009-314
Posted Dec 4, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-314 - Multiple security vulnerabilities has been identified and fixed in apr and apr-util.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2009-2412, CVE-2009-0023, CVE-2009-1955, CVE-2009-1956
SHA-256 | 5a55dc7a21bb7948a31b389923144cacd08f07e3b91a30ff0c39089032a635bf
Gentoo Linux Security Advisory 200907-3
Posted Jul 6, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200907-03 - Multiple vulnerabilities in the Apache Portable Runtime Utility Library might enable remote attackers to cause a Denial of Service or disclose sensitive information. Versions less than 1.3.7 are affected.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2009-0023, CVE-2009-1955, CVE-2009-1956
SHA-256 | 4263d47d1b70e312d108199ea0389b75e3ded16f3aec80a2d0b1d0b8cf07bff9
Ubuntu Security Notice 787-1
Posted Jun 12, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-787-1 - The apache2 packages have been patched to address flaws in apr-util, mod_proxy_ajp, configuration issues, and more.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2009-0023, CVE-2009-1191, CVE-2009-1195, CVE-2009-1955, CVE-2009-1956
SHA-256 | 6699a0f10c75437f8abf294f828cc14f6d1a7f0848d59e33a9b455348d35c9bb
Ubuntu Security Notice 786-1
Posted Jun 11, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-786-1 - Matthew Palmer discovered an underflow flaw in apr-util. An attacker could cause a denial of service via application crash in Apache using a crafted SVNMasterURI directive, .htaccess file, or when using mod_apreq2. Applications using libapreq2 are also affected. It was discovered that the XML parser did not properly handle entity expansion. A remote attacker could cause a denial of service via memory resource consumption by sending a crafted request to an Apache server configured to use mod_dav or mod_dav_svn. C. Michael Pilato discovered an off-by-one buffer overflow in apr-util when formatting certain strings. For big-endian machines (powerpc, hppa and sparc in Ubuntu), a remote attacker could cause a denial of service or information disclosure leak. All other architectures for Ubuntu are not considered to be at risk.

tags | advisory, remote, denial of service, overflow, info disclosure
systems | linux, ubuntu
advisories | CVE-2009-0023, CVE-2009-1955, CVE-2009-1956
SHA-256 | 6fdf404d3e87c32b88b8a588aac734977d1001553fd859a031a0c8e9b929ead9
Mandriva Linux Security Advisory 2009-131
Posted Jun 8, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-131-1 - Multiple security vulnerabilities including off-by-one and denial of service issues have been identified and fixed in apr-util. Fixed packages for CS3 and MNF2 was missing with the last update.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
advisories | CVE-2009-0023, CVE-2009-1955, CVE-2009-1956
SHA-256 | eb63653bb7f489ede1977452aee2e71e5ab8b2560985348a5c4db17376cba613
Mandriva Linux Security Advisory 2009-131
Posted Jun 8, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-131 - Multiple security vulnerabilities including off-by-one and denial of service issues have been identified and fixed in apr-util.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
advisories | CVE-2009-0023, CVE-2009-1955, CVE-2009-1956
SHA-256 | a626201b7956b1b2eadcc2efa32831e214e4ad74a59de24203e9bf47328f472a
Debian Linux Security Advisory 1812-1
Posted Jun 5, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1812-1 - Apr-util, the Apache Portable Runtime Utility library, is used by Apache 2.x, Subversion, and other applications. Two denial of service vulnerabilities have been found in apr-util.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2009-0023
SHA-256 | eb8c93e812784e1119a6b541920db3a85bbaec679c272db21dd323b2a1f0665a
Page 1 of 1
Back1Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    39 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close