First published: Tue Jun 16 2009(Updated: )
The Apache HTTP Server is a popular Web server. The httpd package shipped<br>with Red Hat Enterprise Linux 3 contains an embedded copy of the Apache<br>Portable Runtime (APR) utility library, a free library of C data structures<br>and routines, which includes interfaces to support XML parsing, LDAP<br>connections, database interfaces, URI parsing, and more.<br>An off-by-one overflow flaw was found in the way apr-util processed a<br>variable list of arguments. An attacker could provide a specially-crafted<br>string as input for the formatted output conversion routine, which could,<br>on big-endian platforms, potentially lead to the disclosure of sensitive<br>information or a denial of service (application crash). (CVE-2009-1956)<br>Note: The CVE-2009-1956 flaw only affects big-endian platforms, such as the<br>IBM S/390 and PowerPC. It does not affect users using the httpd package on<br>little-endian platforms, due to their different organization of byte<br>ordering used to represent particular data.<br>A denial of service flaw was found in the apr-util Extensible Markup<br>Language (XML) parser. A remote attacker could create a specially-crafted<br>XML document that would cause excessive memory consumption when processed<br>by the XML decoding engine. (CVE-2009-1955)<br>A heap-based underwrite flaw was found in the way apr-util created compiled<br>forms of particular search patterns. An attacker could formulate a<br>specially-crafted search keyword, that would overwrite arbitrary heap<br>memory locations when processed by the pattern preparation engine.<br>(CVE-2009-0023)<br>All httpd users should upgrade to these updated packages, which contain<br>backported patches to correct these issues. After installing the updated<br>packages, the httpd daemon must be restarted for the update to take effect.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.