Debian DSA-1812-1 : apr-util - denial of service

high Nessus Plugin ID 39333

Synopsis

The remote Debian host is missing a security-related update.

Description

Apr-util, the Apache Portable Runtime Utility library, is used by Apache 2.x, Subversion, and other applications. Two denial of service vulnerabilities have been found in apr-util :

- 'kcope' discovered a flaw in the handling of internal XML entities in the apr_xml_* interface that can be exploited to use all available memory. This denial of service can be triggered remotely in the Apache mod_dav and mod_dav_svn modules. (No CVE id yet)
- CVE-2009-0023 Matthew Palmer discovered an underflow flaw in the apr_strmatch_precompile function that can be exploited to cause a daemon crash. The vulnerability can be triggered (1) remotely in mod_dav_svn for Apache if the 'SVNMasterURI' directive is in use, (2) remotely in mod_apreq2 for Apache or other applications using libapreq2, or (3) locally in Apache by a crafted '.htaccess' file.

Other exploit paths in other applications using apr-util may exist.

If you use Apache, or if you use svnserve in standalone mode, you need to restart the services after you upgraded the libaprutil1 package.

The oldstable distribution (etch), these problems have been fixed in version 1.2.7+dfsg-2+etch2.

Solution

Upgrade the apr-util packages.

For the stable distribution (lenny), these problems have been fixed in version 1.2.12+dfsg-8+lenny2.

See Also

https://security-tracker.debian.org/tracker/CVE-2009-0023

https://www.debian.org/security/2009/dsa-1812

Plugin Details

Severity: High

ID: 39333

File Name: debian_DSA-1812.nasl

Version: 1.22

Type: local

Agent: unix

Published: 6/8/2009

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:5.0, cpe:/o:debian:debian_linux:4.0, p-cpe:/a:debian:debian_linux:apr-util

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/4/2009

Reference Information

CVE: CVE-2009-0023, CVE-2009-1955

CWE: 119, 399

DSA: 1812