Summary
The remote host is missing an update to apr-util
announced via advisory USN-813-3.
Solution
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 8.04 LTS:
libaprutil1 1.2.12+dfsg-3ubuntu0.2
Ubuntu 8.10:
libaprutil1 1.2.12+dfsg-7ubuntu0.3
Ubuntu 9.04:
libaprutil1 1.2.12+dfsg-8ubuntu0.3
After a standard system upgrade you need to restart any applications using apr-util, such as Subversion and Apache, to effect the necessary changes.
https://secure1.securityspace.com/smysecure/catid.html?in=USN-813-3
Insight
USN-813-1 fixed vulnerabilities in apr. This update provides the corresponding updates for apr-util.
Original advisory details:
Matt Lewis discovered that apr did not properly sanitize its input when allocating memory. If an application using apr processed crafted input, a remote attacker could cause a denial of service or potentially execute arbitrary code as the user invoking the application.
Severity
Classification
-
CVE CVE-2009-2412 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities