Description
The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
Published: 2009-06-06
Score: 7.5 High
EPSS: 2.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-786-1 apr-util vulnerabilities
Ubuntu USN Ubuntu USN USN-787-1 Apache vulnerabilities
References
Link Providers
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html cve-icon cve-icon
http://marc.info/?l=apr-dev&m=124396021826125&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=129190899612998&w=2 cve-icon cve-icon
http://secunia.com/advisories/34724 cve-icon cve-icon
http://secunia.com/advisories/35284 cve-icon cve-icon
http://secunia.com/advisories/35360 cve-icon cve-icon
http://secunia.com/advisories/35395 cve-icon cve-icon
http://secunia.com/advisories/35444 cve-icon cve-icon
http://secunia.com/advisories/35487 cve-icon cve-icon
http://secunia.com/advisories/35565 cve-icon cve-icon
http://secunia.com/advisories/35710 cve-icon cve-icon
http://secunia.com/advisories/35797 cve-icon cve-icon
http://secunia.com/advisories/35843 cve-icon cve-icon
http://secunia.com/advisories/36473 cve-icon cve-icon
http://secunia.com/advisories/37221 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200907-03.xml cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210 cve-icon cve-icon
http://support.apple.com/kb/HT3937 cve-icon cve-icon
http://svn.apache.org/viewvc?view=rev&revision=781403 cve-icon cve-icon
http://wiki.rpath.com/Advisories:rPSA-2009-0123 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg1PK88342 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg27014463 cve-icon cve-icon
http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1812 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2009:131 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2009/06/03/4 cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2009-1107.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2009-1108.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/506053/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/35253 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-786-1 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-787-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1907 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/3184 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1107 cve-icon cve-icon
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2009-1955 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2009-1955 cve-icon
https://www.exploit-db.com/exploits/8842 cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html cve-icon cve-icon
History

No history.

Subscriptions

Apache Apr-util Http Server
Apple Mac Os X
Canonical Ubuntu Linux
Debian Debian Linux
Fedoraproject Fedora
Oracle Http Server
Redhat Certificate System Enterprise Linux Jboss Enterprise Web Server
Suse Linux Enterprise Server
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T05:36:19.503Z

Reserved: 2009-06-06T00:00:00.000Z

Link: CVE-2009-1955

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2009-06-08T01:00:00.687

Modified: 2026-04-23T00:35:47.467

Link: CVE-2009-1955

cve-icon Redhat

Severity : Moderate

Publid Date: 2009-06-01T00:00:00Z

Links: CVE-2009-1955 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses