CVE-2009-2412

N/A Unknown
Published: August 06, 2009 Modified: April 23, 2026
View on NVD

Description

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/56765
Source: secalert@redhat.com
http://osvdb.org/56766
Source: secalert@redhat.com
http://secunia.com/advisories/36138
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/36140
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/36166
Source: secalert@redhat.com
http://secunia.com/advisories/36233
Source: secalert@redhat.com
http://secunia.com/advisories/37152
Source: secalert@redhat.com
http://secunia.com/advisories/37221
Source: secalert@redhat.com
http://support.apple.com/kb/HT3937
Source: secalert@redhat.com
http://www.securityfocus.com/bid/35949
Source: secalert@redhat.com
Patch
http://www.ubuntu.com/usn/usn-813-2
Source: secalert@redhat.com
http://osvdb.org/56765
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/56766
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/36138
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36140
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36166
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/36233
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37152
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37221
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT3937
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg1PK93225
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg1PK99482
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:195
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/35949
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.ubuntu.com/usn/usn-813-2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/3184
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/1107
Source: af854a3a-2127-422b-91ae-364da2661108

102 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
7.8%
92th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache