7.5

CVE-2009-1955

Exploit

The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.

Data is provided by the National Vulnerability Database (NVD)
ApacheApr-util Version < 1.3.7
ApplemacOS X Version < 10.6.2
DebianDebian Linux Version4.0
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version8.10
CanonicalUbuntu Linux Version9.04
FedoraprojectFedora Version9
FedoraprojectFedora Version10
FedoraprojectFedora Version11
OracleHTTP Server Version-
ApacheHTTP Server Version >= 2.2.0 < 2.2.12
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 3.66% 0.874
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-776 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.

http://www.vupen.com/english/advisories/2009/3184
Third Party Advisory
Broken Link
http://www.vupen.com/english/advisories/2010/1107
Third Party Advisory
Broken Link
http://secunia.com/advisories/35395
Third Party Advisory
Broken Link
http://secunia.com/advisories/34724
Third Party Advisory
Broken Link
http://secunia.com/advisories/35284
Third Party Advisory
Broken Link
http://secunia.com/advisories/35360
Third Party Advisory
Broken Link
http://secunia.com/advisories/35444
Third Party Advisory
Broken Link
http://secunia.com/advisories/35487
Third Party Advisory
Broken Link
http://secunia.com/advisories/35565
Third Party Advisory
Broken Link
http://secunia.com/advisories/35710
Third Party Advisory
Broken Link
http://secunia.com/advisories/35797
Third Party Advisory
Broken Link
http://secunia.com/advisories/35843
Third Party Advisory
Broken Link
http://secunia.com/advisories/37221
Third Party Advisory
Broken Link
http://www.debian.org/security/2009/dsa-1812
Third Party Advisory
Mailing List
http://www.vupen.com/english/advisories/2009/1907
Third Party Advisory
Broken Link
http://secunia.com/advisories/36473
Third Party Advisory
Broken Link
http://www.securityfocus.com/archive/1/506053/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/35253
Third Party Advisory
Broken Link
VDB Entry