Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

Apache APR and APR-util Multiple Integer Overflow Vulnerabilities
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The host is installed with Apache APR and APR-Util and is prone to multiple Integer Overflow vulnerabilities.
Insight
Insight
The following issues exist: - An error exists when vectors trigger crafted calls to the allocator_alloc or apr_palloc function in memory/unix/apr_pools.c in APR. - An error in apr_rmm_malloc, apr_rmm_calloc or apr_rmm_realloc function in misc/apr_rmm.c is caused while aligning relocatable memory blocks in APR-util.
Affected Software
Affected Software
Apache APR version 0.9.x and 1.3.x before 1.3.8 Apache APR-Utils version 0.9.x and 1.3.x before 1.3.9
Solution
Solution
Upgrade to Apache APR version 1.3.8 or APR-util version 1.3.9 or apply the patches for Apache APR-Utils 0.9.x or Apache APR version 0.9.x. Please see the references for more information. ***** NOTE: Ignore this warning if above mentioned patch is already applied. *****