Think you have a false positive on this rule?

Sid 1-23779

Message

SERVER-APACHE Apache WebDAV mod_dav nested entity reference DoS attempt

Summary

The expat XML parser in the aprxml* interface in xml/aprxml.c in Apache APR-util before 1.3.7, as used in the moddav and moddavsvn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.

Impact

CVSS base score 7.8 CVSS impact score 6.9 CVSS exploitability score 10.0 confidentialityImpact NONE integrityImpact NONE availabilityImpact NONE

CVE-2009-1955:

CVSS base score 7.8

CVSS impact score 6.9

CVSS exploitability score 10.0

Confidentiality Impact NONE

Integrity Impact NONE

Availability Impact COMPLETE

Detailed information

CVE-2009-1955: The expat XML parser in the aprxml* interface in xml/aprxml.c in Apache APR-util before 1.3.7, as used in the moddav and moddavsvn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.

Affected systems

  • apache apr-util 0.9.1
  • apache apr-util 0.9.2
  • apache apr-util 0.9.3
  • apache apr-util 0.9.4
  • apache apr-util 0.9.5
  • apache apr-util 1.0
  • apache apr-util 1.0.1
  • apache apr-util 1.0.2
  • apache apr-util 1.1.0
  • apache apr-util 1.1.1
  • apache apr-util 1.1.2
  • apache apr-util 1.2.1
  • apache apr-util 1.2.2
  • apache apr-util 1.2.6
  • apache apr-util 1.2.7
  • apache apr-util 1.2.8
  • apache apr-util 1.3.0
  • apache apr-util 1.3.1
  • apache apr-util 1.3.2
  • apache apr-util 1.3.3
  • apache apr-util 1.3.4
  • apache apr-util 1.3.5
  • apache apr-util 1.3.6
  • apache http_server *

Ease of attack

CVE-2009-1955:

Access Vector NETWORK

Access Complexity LOW

Authentication NONE

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References