CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS
Percentile
27.2%
Severity: Medium
Date : 2017-10-27
CVE-ID : CVE-2017-12613
Package : apr
Type : information disclosure
Remote : Yes
Link : https://security.archlinux.org/AVG-469
The package apr before version 1.6.3-1 is vulnerable to information
disclosure.
Upgrade to 1.6.3-1.
The problem has been fixed upstream in version 1.6.3.
None.
When apr_exp_time*() or apr_os_exp_time*() functions are invoked with
an invalid month field value in APR 1.6.2 and prior, out of bounds
memory may be accessed in converting this value to an apr_time_exp_t
value, potentially revealing the contents of a different static heap
value or resulting in program termination, and may represent an
information disclosure or denial of service vulnerability to
applications which call these APR functions with unvalidated external
input.
A remote attacker can access sensitive information or cause a denial of
service by submitting specially crafted input.
https://mail-archives.apache.org/mod_mbox/apr-dev/201710.mbox/<CACsi252POs4toeJJciwg09_eu2cO3XFg%3DUqsPjXsfjDoeC3-UQ%40mail.gmail.com>
https://security.archlinux.org/CVE-2017-12613
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS
Percentile
27.2%