4.3
CVSSv2

CVE-2009-0023

Published: 08/06/2009 Updated: 02/02/2024
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util prior to 1.3.5 allows remote malicious users to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache apr-util 1.3.3

apache apr-util 1.2.7

apache apr-util 1.2.8

apache apr-util 1.2.2

apache apr-util 1.3.0

apache apr-util 0.9.4

apache apr-util 1.0.2

apache apr-util 1.0

apache apr-util 1.2.1

apache apr-util 0.9.3

apache apr-util 1.1.0

apache apr-util 0.9.1

apache apr-util

apache apr-util 1.3.1

apache apr-util 0.9.2

apache apr-util 1.3.2

apache apr-util 1.1.1

apache apr-util 1.1.2

apache apr-util 1.2.6

apache apr-util 1.0.1

apache apr-util 0.9.5

apache http server

Vendor Advisories

Synopsis Moderate: apr-util security update Type/Severity Security Advisory: Moderate Topic Updated apr-util packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 4 and 5This update has been rated as having moderate security impact by the RedHat Security Response Team ...
Synopsis Moderate: httpd security update Type/Severity Security Advisory: Moderate Topic Updated httpd packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 3This update has been rated as having moderate security impact by the RedHat Security Response Team Descr ...
Matthew Palmer discovered an underflow flaw in apr-util as included in Apache An attacker could cause a denial of service via application crash in Apache using a crafted SVNMasterURI directive, htaccess file, or when using mod_apreq2 This issue only affected Ubuntu 606 LTS (CVE-2009-0023) ...
Matthew Palmer discovered an underflow flaw in apr-util An attacker could cause a denial of service via application crash in Apache using a crafted SVNMasterURI directive, htaccess file, or when using mod_apreq2 Applications using libapreq2 are also affected (CVE-2009-0023) ...
Apr-util, the Apache Portable Runtime Utility library, is used by Apache 2x, Subversion, and other applications Two denial of service vulnerabilities have been found in apr-util: "kcope" discovered a flaw in the handling of internal XML entities in the apr_xml_* interface that can be exploited to use all available memory This denial of service ...

References

CWE-119http://www.debian.org/security/2009/dsa-1812http://www.securityfocus.com/bid/35221http://secunia.com/advisories/35284https://bugzilla.redhat.com/show_bug.cgi?id=503928http://secunia.com/advisories/35360http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3http://svn.apache.org/viewvc?view=rev&revision=779880http://www.mandriva.com/security/advisories?name=MDVSA-2009:131http://www.ubuntu.com/usn/usn-786-1http://www.redhat.com/support/errata/RHSA-2009-1108.htmlhttp://www.redhat.com/support/errata/RHSA-2009-1107.htmlhttp://secunia.com/advisories/35444http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210http://secunia.com/advisories/34724http://secunia.com/advisories/35487http://secunia.com/advisories/35395http://www.ubuntu.com/usn/usn-787-1https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.htmlhttp://secunia.com/advisories/35565http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241http://security.gentoo.org/glsa/glsa-200907-03.xmlhttp://secunia.com/advisories/35710http://www-01.ibm.com/support/docview.wss?uid=swg1PK88341http://secunia.com/advisories/35797http://secunia.com/advisories/35843http://www.vupen.com/english/advisories/2009/1907http://support.apple.com/kb/HT3937http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.htmlhttp://www.vupen.com/english/advisories/2009/3184http://www-01.ibm.com/support/docview.wss?uid=swg27014463http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478http://secunia.com/advisories/37221http://wiki.rpath.com/Advisories:rPSA-2009-0144http://marc.info/?l=bugtraq&m=129190899612998&w=2http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:150https://exchange.xforce.ibmcloud.com/vulnerabilities/50964https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12321https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10968http://www.securityfocus.com/archive/1/507855/100/0/threadedhttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3Ehttps://access.redhat.com/errata/RHSA-2009:1107https://usn.ubuntu.com/787-1/https://nvd.nist.gov