Lucene search

K
archlinuxArchLinuxASA-201710-32
HistoryOct 27, 2017 - 12:00 a.m.

[ASA-201710-32] apr: information disclosure

2017-10-2700:00:00
security.archlinux.org
18

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:N/A:P

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

EPSS

0.001

Percentile

27.2%

Arch Linux Security Advisory ASA-201710-32

Severity: Medium
Date : 2017-10-27
CVE-ID : CVE-2017-12613
Package : apr
Type : information disclosure
Remote : Yes
Link : https://security.archlinux.org/AVG-469

Summary

The package apr before version 1.6.3-1 is vulnerable to information
disclosure.

Resolution

Upgrade to 1.6.3-1.

pacman -Syu “apr>=1.6.3-1”

The problem has been fixed upstream in version 1.6.3.

Workaround

None.

Description

When apr_exp_time*() or apr_os_exp_time*() functions are invoked with
an invalid month field value in APR 1.6.2 and prior, out of bounds
memory may be accessed in converting this value to an apr_time_exp_t
value, potentially revealing the contents of a different static heap
value or resulting in program termination, and may represent an
information disclosure or denial of service vulnerability to
applications which call these APR functions with unvalidated external
input.

Impact

A remote attacker can access sensitive information or cause a denial of
service by submitting specially crafted input.

References

https://mail-archives.apache.org/mod_mbox/apr-dev/201710.mbox/<CACsi252POs4toeJJciwg09_eu2cO3XFg%3DUqsPjXsfjDoeC3-UQ%40mail.gmail.com>
https://security.archlinux.org/CVE-2017-12613

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyapr< 1.6.3-1UNKNOWN

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:N/A:P

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

EPSS

0.001

Percentile

27.2%