CVE-2017-12618

LOW

Description

Apache Portable Runtime Utility (APR-util) 1.6.0 and prior fail to validate the integrity of SDBM database files used by apr_sdbm*() functions, resulting in a possible out of bound read access. A local user with write access to the database can make a program or process using these functions crash, and cause a denial of service.

References

http://mail-archives.apache.org/mod_mbox/apr-dev/201710.mbox/%3CCACsi252POs4toeJJciwg09_eu2cO3XFg%3DUqsPjXsfjDoeC3-UQ%40mail.gmail.com%3E

http://www.securityfocus.com/bid/101558

http://www.securitytracker.com/id/1042004

https://lists.debian.org/debian-lts-announce/2017/11/msg00006.html

Details

Source: MITRE

Published: 2017-10-24

Updated: 2018-10-31

Type: CWE-125

Risk Information

CVSS v2.0

Base Score: 1.9

Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.4

Severity: LOW

CVSS v3.0

Base Score: 4.7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:portable_runtime_utility:0.9.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:0.9.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.1.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.2.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.2.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.2.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.2.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.2.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.2.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.2.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.3.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.4.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.4.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.5.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.5.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.5.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.5.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:portable_runtime_utility:1.6.0:*:*:*:*:*:*:*

Tenable Plugins

View all (11 total)

IDNameProductFamilySeverity
144074IBM HTTP Server 7.0.0.0 < 7.0.0.45 / 8.0.0.0 < 8.0.0.15 / 8.5.0.0 < 8.5.5.13 / 9.0.0.0 < 9.0.0.6 Multiple Vulnerabilities (298437)NessusWeb Servers
medium
700518macOS < 10.14 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
critical
118575macOS 10.13.6 Multiple Vulnerabilities (Security Update 2018-002)NessusMacOS X Local Security Checks
critical
118573macOS and Mac OS X Multiple Vulnerabilities (Security Update 2018-005)NessusMacOS X Local Security Checks
critical
118178macOS < 10.14 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
106532SUSE SLES11 Security Update : libapr-util1 (SUSE-SU-2018:0307-1)NessusSuSE Local Security Checks
low
105265openSUSE Security Update : libapr-util1 (openSUSE-2017-1370)NessusSuSE Local Security Checks
low
105253SUSE SLES12 Security Update : libapr-util1 (SUSE-SU-2017:3278-1)NessusSuSE Local Security Checks
low
105053Amazon Linux AMI : apr-util (ALAS-2017-929)NessusAmazon Linux Local Security Checks
low
104593Fedora 26 : apr-util (2017-329e5fb4c9)NessusFedora Local Security Checks
low
104413Debian DLA-1163-1 : apr-util security updateNessusDebian Local Security Checks
low