Lucene search

K
ubuntuUbuntuUSN-813-1
HistoryAug 08, 2009 - 12:00 a.m.

apr vulnerability

2009-08-0800:00:00
ubuntu.com
37

6.9 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.11 Low

EPSS

Percentile

95.1%

Releases

  • Ubuntu 9.04
  • Ubuntu 8.10
  • Ubuntu 8.04

Packages

  • apr -

Details

Matt Lewis discovered that apr did not properly sanitize its input when
allocating memory. If an application using apr processed crafted input, a
remote attacker could cause a denial of service or potentially execute
arbitrary code as the user invoking the application.

OSVersionArchitecturePackageVersionFilename
Ubuntu9.04noarchlibapr1<Β 1.2.12-5ubuntu0.1UNKNOWN
Ubuntu9.04noarchlibapr1-dbg<Β 1.2.12-5ubuntu0.1UNKNOWN
Ubuntu9.04noarchlibapr1-dev<Β 1.2.12-5ubuntu0.1UNKNOWN
Ubuntu8.10noarchlibapr1<Β 1.2.12-4ubuntu0.1UNKNOWN
Ubuntu8.10noarchlibapr1-dbg<Β 1.2.12-4ubuntu0.1UNKNOWN
Ubuntu8.10noarchlibapr1-dev<Β 1.2.12-4ubuntu0.1UNKNOWN
Ubuntu8.04noarchlibapr1<Β 1.2.11-1ubuntu0.1UNKNOWN
Ubuntu8.04noarchlibapr1-dbg<Β 1.2.11-1ubuntu0.1UNKNOWN
Ubuntu8.04noarchlibapr1-dev<Β 1.2.11-1ubuntu0.1UNKNOWN

6.9 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.11 Low

EPSS

Percentile

95.1%