7.5
HIGH
CVE-2009-1955
Apache APR-util Entity Reference DOS Vulnerability
Description

The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.

INFO

Published Date :

June 8, 2009, 1 a.m.

Last Modified :

Nov. 21, 2024, 1:03 a.m.

Remotely Exploitable :

Yes !

Impact Score :

3.6

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2009-1955 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Apache http_server
2 Apache apr-util
1 Canonical ubuntu_linux
1 Fedoraproject fedora
1 Debian debian_linux
1 Apple mac_os_x
1 Suse linux_enterprise_server
1 Oracle http_server
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2009-1955.

URL Resource
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html Mailing List Third Party Advisory
http://marc.info/?l=apr-dev&m=124396021826125&w=2 Mailing List Patch
http://marc.info/?l=bugtraq&m=129190899612998&w=2 Mailing List
http://marc.info/?l=bugtraq&m=129190899612998&w=2 Mailing List
http://secunia.com/advisories/34724 Broken Link Third Party Advisory
http://secunia.com/advisories/35284 Broken Link Third Party Advisory
http://secunia.com/advisories/35360 Broken Link Third Party Advisory
http://secunia.com/advisories/35395 Broken Link Third Party Advisory
http://secunia.com/advisories/35444 Broken Link Third Party Advisory
http://secunia.com/advisories/35487 Broken Link Third Party Advisory
http://secunia.com/advisories/35565 Broken Link Third Party Advisory
http://secunia.com/advisories/35710 Broken Link Third Party Advisory
http://secunia.com/advisories/35797 Broken Link Third Party Advisory
http://secunia.com/advisories/35843 Broken Link Third Party Advisory
http://secunia.com/advisories/36473 Broken Link Third Party Advisory
http://secunia.com/advisories/37221 Broken Link Third Party Advisory
http://security.gentoo.org/glsa/glsa-200907-03.xml Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210 Broken Link Third Party Advisory
http://support.apple.com/kb/HT3937 Broken Link
http://svn.apache.org/viewvc?view=rev&revision=781403 Patch
http://wiki.rpath.com/Advisories:rPSA-2009-0123 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg1PK88342 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241 Broken Link Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478 Broken Link Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg27014463 Broken Link Third Party Advisory
http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3 Broken Link
http://www.debian.org/security/2009/dsa-1812 Mailing List Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:131 Broken Link Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Broken Link Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/06/03/4 Mailing List
http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html Patch Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1107.html Broken Link Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1108.html Broken Link Third Party Advisory
http://www.securityfocus.com/archive/1/506053/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/35253 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-786-1 Third Party Advisory
http://www.ubuntu.com/usn/usn-787-1 Third Party Advisory
http://www.vupen.com/english/advisories/2009/1907 Broken Link Third Party Advisory
http://www.vupen.com/english/advisories/2009/3184 Broken Link Third Party Advisory
http://www.vupen.com/english/advisories/2010/1107 Broken Link Third Party Advisory
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473 Broken Link Third Party Advisory
https://www.exploit-db.com/exploits/8842 Exploit VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html Mailing List
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html Mailing List Third Party Advisory
http://marc.info/?l=apr-dev&m=124396021826125&w=2 Mailing List Patch
http://marc.info/?l=bugtraq&m=129190899612998&w=2 Mailing List
http://marc.info/?l=bugtraq&m=129190899612998&w=2 Mailing List
http://secunia.com/advisories/34724 Broken Link Third Party Advisory
http://secunia.com/advisories/35284 Broken Link Third Party Advisory
http://secunia.com/advisories/35360 Broken Link Third Party Advisory
http://secunia.com/advisories/35395 Broken Link Third Party Advisory
http://secunia.com/advisories/35444 Broken Link Third Party Advisory
http://secunia.com/advisories/35487 Broken Link Third Party Advisory
http://secunia.com/advisories/35565 Broken Link Third Party Advisory
http://secunia.com/advisories/35710 Broken Link Third Party Advisory
http://secunia.com/advisories/35797 Broken Link Third Party Advisory
http://secunia.com/advisories/35843 Broken Link Third Party Advisory
http://secunia.com/advisories/36473 Broken Link Third Party Advisory
http://secunia.com/advisories/37221 Broken Link Third Party Advisory
http://security.gentoo.org/glsa/glsa-200907-03.xml Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210 Broken Link Third Party Advisory
http://support.apple.com/kb/HT3937 Broken Link
http://svn.apache.org/viewvc?view=rev&revision=781403 Patch
http://wiki.rpath.com/Advisories:rPSA-2009-0123 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg1PK88342 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241 Broken Link Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478 Broken Link Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg27014463 Broken Link Third Party Advisory
http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3 Broken Link
http://www.debian.org/security/2009/dsa-1812 Mailing List Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:131 Broken Link Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Broken Link Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/06/03/4 Mailing List
http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html Patch Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1107.html Broken Link Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1108.html Broken Link Third Party Advisory
http://www.securityfocus.com/archive/1/506053/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/35253 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-786-1 Third Party Advisory
http://www.ubuntu.com/usn/usn-787-1 Third Party Advisory
http://www.vupen.com/english/advisories/2009/1907 Broken Link Third Party Advisory
http://www.vupen.com/english/advisories/2009/3184 Broken Link Third Party Advisory
http://www.vupen.com/english/advisories/2010/1107 Broken Link Third Party Advisory
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473 Broken Link Third Party Advisory
https://www.exploit-db.com/exploits/8842 Exploit VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html Mailing List

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2009-1955 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2009-1955 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
    Added Reference http://marc.info/?l=apr-dev&m=124396021826125&w=2
    Added Reference http://marc.info/?l=bugtraq&m=129190899612998&w=2
    Added Reference http://marc.info/?l=bugtraq&m=129190899612998&w=2
    Added Reference http://secunia.com/advisories/34724
    Added Reference http://secunia.com/advisories/35284
    Added Reference http://secunia.com/advisories/35360
    Added Reference http://secunia.com/advisories/35395
    Added Reference http://secunia.com/advisories/35444
    Added Reference http://secunia.com/advisories/35487
    Added Reference http://secunia.com/advisories/35565
    Added Reference http://secunia.com/advisories/35710
    Added Reference http://secunia.com/advisories/35797
    Added Reference http://secunia.com/advisories/35843
    Added Reference http://secunia.com/advisories/36473
    Added Reference http://secunia.com/advisories/37221
    Added Reference http://security.gentoo.org/glsa/glsa-200907-03.xml
    Added Reference http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210
    Added Reference http://support.apple.com/kb/HT3937
    Added Reference http://svn.apache.org/viewvc?view=rev&revision=781403
    Added Reference http://wiki.rpath.com/Advisories:rPSA-2009-0123
    Added Reference http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3
    Added Reference http://www.debian.org/security/2009/dsa-1812
    Added Reference http://www.mandriva.com/security/advisories?name=MDVSA-2009:131
    Added Reference http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
    Added Reference http://www.openwall.com/lists/oss-security/2009/06/03/4
    Added Reference http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
    Added Reference http://www.redhat.com/support/errata/RHSA-2009-1107.html
    Added Reference http://www.redhat.com/support/errata/RHSA-2009-1108.html
    Added Reference http://www.securityfocus.com/archive/1/506053/100/0/threaded
    Added Reference http://www.securityfocus.com/bid/35253
    Added Reference http://www.ubuntu.com/usn/usn-786-1
    Added Reference http://www.ubuntu.com/usn/usn-787-1
    Added Reference http://www.vupen.com/english/advisories/2009/1907
    Added Reference http://www.vupen.com/english/advisories/2009/3184
    Added Reference http://www.vupen.com/english/advisories/2010/1107
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg1PK88342
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg27014463
    Added Reference https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270
    Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473
    Added Reference https://www.exploit-db.com/exploits/8842
    Added Reference https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html
    Added Reference https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html
    Added Reference https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    Feb. 02, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    Changed Reference Type http://marc.info/?l=apr-dev&m=124396021826125&w=2 Mailing List, Patch, Third Party Advisory http://marc.info/?l=apr-dev&m=124396021826125&w=2 Mailing List, Patch
    Changed Reference Type http://marc.info/?l=bugtraq&m=129190899612998&w=2 Third Party Advisory http://marc.info/?l=bugtraq&m=129190899612998&w=2 Mailing List
    Changed Reference Type http://secunia.com/advisories/34724 Third Party Advisory http://secunia.com/advisories/34724 Broken Link, Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35284 Third Party Advisory http://secunia.com/advisories/35284 Broken Link, Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35360 Third Party Advisory http://secunia.com/advisories/35360 Broken Link, Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35395 Third Party Advisory http://secunia.com/advisories/35395 Broken Link, Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35444 Third Party Advisory http://secunia.com/advisories/35444 Broken Link, Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35487 Third Party Advisory http://secunia.com/advisories/35487 Broken Link, Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35565 Third Party Advisory http://secunia.com/advisories/35565 Broken Link, Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35710 Third Party Advisory http://secunia.com/advisories/35710 Broken Link, Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35797 Third Party Advisory http://secunia.com/advisories/35797 Broken Link, Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35843 Third Party Advisory http://secunia.com/advisories/35843 Broken Link, Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/36473 Third Party Advisory http://secunia.com/advisories/36473 Broken Link, Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/37221 Third Party Advisory http://secunia.com/advisories/37221 Broken Link, Third Party Advisory
    Changed Reference Type http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210 Third Party Advisory http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210 Broken Link, Third Party Advisory
    Changed Reference Type http://svn.apache.org/viewvc?view=rev&revision=781403 Third Party Advisory http://svn.apache.org/viewvc?view=rev&revision=781403 Patch
    Changed Reference Type http://www.debian.org/security/2009/dsa-1812 Third Party Advisory http://www.debian.org/security/2009/dsa-1812 Mailing List, Third Party Advisory
    Changed Reference Type http://www.mandriva.com/security/advisories?name=MDVSA-2009:131 Third Party Advisory http://www.mandriva.com/security/advisories?name=MDVSA-2009:131 Broken Link, Third Party Advisory
    Changed Reference Type http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Third Party Advisory http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Broken Link, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2009/06/03/4 Mailing List, Third Party Advisory http://www.openwall.com/lists/oss-security/2009/06/03/4 Mailing List
    Changed Reference Type http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html Third Party Advisory http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html Patch, Third Party Advisory
    Changed Reference Type http://www.redhat.com/support/errata/RHSA-2009-1107.html Third Party Advisory http://www.redhat.com/support/errata/RHSA-2009-1107.html Broken Link, Third Party Advisory
    Changed Reference Type http://www.redhat.com/support/errata/RHSA-2009-1108.html Third Party Advisory http://www.redhat.com/support/errata/RHSA-2009-1108.html Broken Link, Third Party Advisory
    Changed Reference Type http://www.securityfocus.com/archive/1/506053/100/0/threaded Third Party Advisory, VDB Entry http://www.securityfocus.com/archive/1/506053/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
    Changed Reference Type http://www.securityfocus.com/bid/35253 Third Party Advisory, VDB Entry http://www.securityfocus.com/bid/35253 Broken Link, Third Party Advisory, VDB Entry
    Changed Reference Type http://www.vupen.com/english/advisories/2009/1907 Third Party Advisory http://www.vupen.com/english/advisories/2009/1907 Broken Link, Third Party Advisory
    Changed Reference Type http://www.vupen.com/english/advisories/2009/3184 Third Party Advisory http://www.vupen.com/english/advisories/2009/3184 Broken Link, Third Party Advisory
    Changed Reference Type http://www.vupen.com/english/advisories/2010/1107 Third Party Advisory http://www.vupen.com/english/advisories/2010/1107 Broken Link, Third Party Advisory
    Changed Reference Type http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241 Third Party Advisory http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241 Broken Link, Third Party Advisory
    Changed Reference Type http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478 Third Party Advisory http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478 Broken Link, Third Party Advisory
    Changed Reference Type http://www-01.ibm.com/support/docview.wss?uid=swg27014463 Third Party Advisory http://www-01.ibm.com/support/docview.wss?uid=swg27014463 Broken Link, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270 Third Party Advisory https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270 Broken Link, Third Party Advisory
    Changed Reference Type https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473 Third Party Advisory https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473 Broken Link, Third Party Advisory
    Changed Reference Type https://www.exploit-db.com/exploits/8842 Exploit, Third Party Advisory, VDB Entry https://www.exploit-db.com/exploits/8842 Exploit, VDB Entry
    Changed Reference Type https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html Third Party Advisory https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html Mailing List
    Changed Reference Type https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html Third Party Advisory https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html Mailing List
    Changed Reference Type https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html Third Party Advisory https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html Mailing List
    Removed CWE NIST NVD-CWE-noinfo
    Added CWE NIST CWE-776
  • CVE Modified by [email protected]

    Nov. 07, 2023

    Action Type Old Value New Value
    Added Reference MITRE https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference MITRE https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Removed Reference MITRE https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
    Removed Reference MITRE https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
  • Modified Analysis by [email protected]

    Oct. 31, 2023

    Action Type Old Value New Value
    Changed Reference Type https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E Mailing List, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E Mailing List, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E Mailing List, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E Mailing List, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E Mailing List, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E Mailing List, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E Mailing List, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E Mailing List, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E Mailing List, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E Mailing List, Third Party Advisory
    Added CPE Configuration OR *cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* versions from (including) 2.2.0 up to (excluding) 2.2.12
  • CVE Modified by [email protected]

    Jun. 06, 2021

    Action Type Old Value New Value
    Added Reference https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 06, 2021

    Action Type Old Value New Value
    Added Reference https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 03, 2021

    Action Type Old Value New Value
    Added Reference https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
    Added Reference https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
    Added Reference https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
    Added Reference https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
    Added Reference https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
    Added Reference https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 30, 2021

    Action Type Old Value New Value
    Added Reference https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
    Added Reference https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
  • Modified Analysis by [email protected]

    Oct. 13, 2020

    Action Type Old Value New Value
    Removed CVSS V2 NIST (AV:N/AC:L/Au:N/C:N/I:N/A:C)
    Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:N/I:N/A:P)
    Changed Reference Type http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html No Types Assigned http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html Mailing List, Third Party Advisory
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html Mailing List, Third Party Advisory
    Changed Reference Type http://marc.info/?l=apr-dev&m=124396021826125&w=2 Patch http://marc.info/?l=apr-dev&m=124396021826125&w=2 Mailing List, Patch, Third Party Advisory
    Changed Reference Type http://marc.info/?l=bugtraq&m=129190899612998&w=2 No Types Assigned http://marc.info/?l=bugtraq&m=129190899612998&w=2 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/34724 Vendor Advisory http://secunia.com/advisories/34724 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35284 Vendor Advisory http://secunia.com/advisories/35284 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35360 Vendor Advisory http://secunia.com/advisories/35360 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35395 Vendor Advisory http://secunia.com/advisories/35395 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35444 Vendor Advisory http://secunia.com/advisories/35444 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35487 Vendor Advisory http://secunia.com/advisories/35487 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35565 Vendor Advisory http://secunia.com/advisories/35565 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35710 Vendor Advisory http://secunia.com/advisories/35710 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35797 No Types Assigned http://secunia.com/advisories/35797 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/35843 No Types Assigned http://secunia.com/advisories/35843 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/36473 Vendor Advisory http://secunia.com/advisories/36473 Third Party Advisory
    Changed Reference Type http://secunia.com/advisories/37221 Vendor Advisory http://secunia.com/advisories/37221 Third Party Advisory
    Changed Reference Type http://security.gentoo.org/glsa/glsa-200907-03.xml No Types Assigned http://security.gentoo.org/glsa/glsa-200907-03.xml Third Party Advisory
    Changed Reference Type http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210 No Types Assigned http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210 Third Party Advisory
    Changed Reference Type http://support.apple.com/kb/HT3937 No Types Assigned http://support.apple.com/kb/HT3937 Broken Link
    Changed Reference Type http://svn.apache.org/viewvc?view=rev&revision=781403 No Types Assigned http://svn.apache.org/viewvc?view=rev&revision=781403 Third Party Advisory
    Changed Reference Type http://wiki.rpath.com/Advisories:rPSA-2009-0123 No Types Assigned http://wiki.rpath.com/Advisories:rPSA-2009-0123 Broken Link
    Changed Reference Type http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3 Patch http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3 Broken Link
    Changed Reference Type http://www.debian.org/security/2009/dsa-1812 Patch http://www.debian.org/security/2009/dsa-1812 Third Party Advisory
    Changed Reference Type http://www.mandriva.com/security/advisories?name=MDVSA-2009:131 No Types Assigned http://www.mandriva.com/security/advisories?name=MDVSA-2009:131 Third Party Advisory
    Changed Reference Type http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No Types Assigned http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2009/06/03/4 No Types Assigned http://www.openwall.com/lists/oss-security/2009/06/03/4 Mailing List, Third Party Advisory
    Changed Reference Type http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html No Types Assigned http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html Third Party Advisory
    Changed Reference Type http://www.redhat.com/support/errata/RHSA-2009-1107.html No Types Assigned http://www.redhat.com/support/errata/RHSA-2009-1107.html Third Party Advisory
    Changed Reference Type http://www.redhat.com/support/errata/RHSA-2009-1108.html No Types Assigned http://www.redhat.com/support/errata/RHSA-2009-1108.html Third Party Advisory
    Changed Reference Type http://www.securityfocus.com/archive/1/506053/100/0/threaded No Types Assigned http://www.securityfocus.com/archive/1/506053/100/0/threaded Third Party Advisory, VDB Entry
    Changed Reference Type http://www.securityfocus.com/bid/35253 No Types Assigned http://www.securityfocus.com/bid/35253 Third Party Advisory, VDB Entry
    Changed Reference Type http://www.ubuntu.com/usn/usn-786-1 No Types Assigned http://www.ubuntu.com/usn/usn-786-1 Third Party Advisory
    Changed Reference Type http://www.ubuntu.com/usn/usn-787-1 No Types Assigned http://www.ubuntu.com/usn/usn-787-1 Third Party Advisory
    Changed Reference Type http://www.vupen.com/english/advisories/2009/1907 No Types Assigned http://www.vupen.com/english/advisories/2009/1907 Third Party Advisory
    Changed Reference Type http://www.vupen.com/english/advisories/2009/3184 Vendor Advisory http://www.vupen.com/english/advisories/2009/3184 Third Party Advisory
    Changed Reference Type http://www.vupen.com/english/advisories/2010/1107 No Types Assigned http://www.vupen.com/english/advisories/2010/1107 Third Party Advisory
    Changed Reference Type http://www-01.ibm.com/support/docview.wss?uid=swg1PK88342 No Types Assigned http://www-01.ibm.com/support/docview.wss?uid=swg1PK88342 Broken Link
    Changed Reference Type http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241 No Types Assigned http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241 Third Party Advisory
    Changed Reference Type http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478 No Types Assigned http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478 Third Party Advisory
    Changed Reference Type http://www-01.ibm.com/support/docview.wss?uid=swg27014463 No Types Assigned http://www-01.ibm.com/support/docview.wss?uid=swg27014463 Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E Mailing List, Vendor Advisory
    Changed Reference Type https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E Mailing List, Vendor Advisory
    Changed Reference Type https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E Mailing List, Vendor Advisory
    Changed Reference Type https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E Mailing List, Vendor Advisory
    Changed Reference Type https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270 No Types Assigned https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270 Third Party Advisory
    Changed Reference Type https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473 No Types Assigned https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473 Third Party Advisory
    Changed Reference Type https://www.exploit-db.com/exploits/8842 No Types Assigned https://www.exploit-db.com/exploits/8842 Exploit, Third Party Advisory, VDB Entry
    Changed Reference Type https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html No Types Assigned https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html Third Party Advisory
    Changed Reference Type https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html No Types Assigned https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html Third Party Advisory
    Changed Reference Type https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html No Types Assigned https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html Third Party Advisory
    Removed CWE NIST CWE-399
    Added CWE NIST NVD-CWE-noinfo
    Changed CPE Configuration OR *cpe:2.3:a:apache:apr-util:0.9.1:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:0.9.2:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:0.9.3:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:0.9.4:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:0.9.5:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.0:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.0.1:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.0.2:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.1.0:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.1.1:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.1.2:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.2.1:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.2.2:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.2.6:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.2.7:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.2.8:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.3.0:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.3.1:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.3.2:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.3.3:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.3.4:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:1.3.5:*:*:*:*:*:*:* *cpe:2.3:a:apache:apr-util:*:*:*:*:*:*:*:* versions up to (including) 1.3.6 *cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* OR *cpe:2.3:a:apache:apr-util:*:*:*:*:*:*:*:* versions up to (excluding) 1.3.7
    Added CPE Configuration OR *cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions up to (excluding) 10.6.2
    Added CPE Configuration OR *cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:* *cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:* *cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:oracle:http_server:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Apr. 01, 2020

    Action Type Old Value New Value
    Added Reference https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 01, 2020

    Action Type Old Value New Value
    Added Reference https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 15, 2019

    Action Type Old Value New Value
    Added Reference https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
    Added Reference https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 10, 2018

    Action Type Old Value New Value
    Removed Reference http://www.securityfocus.com/archive/1/archive/1/506053/100/0/threaded [No Types Assigned]
    Added Reference http://www.securityfocus.com/archive/1/506053/100/0/threaded [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 29, 2017

    Action Type Old Value New Value
    Removed Reference http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10270 [No Types Assigned]
    Removed Reference http://www.milw0rm.com/exploits/8842 [Exploit]
    Removed Reference http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12473 [No Types Assigned]
    Added Reference https://www.exploit-db.com/exploits/8842 [No Types Assigned]
    Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473 [No Types Assigned]
    Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270 [No Types Assigned]
  • Initial Analysis by [email protected]

    Jun. 08, 2009

    Action Type Old Value New Value
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2009-1955 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2009-1955 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

35.47 }} 15.53%

score

0.97149

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability