4.3

CVE-2011-0419

Exploit

Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.

Data is provided by the National Vulnerability Database (NVD)
ApachePortable Runtime Version < 1.4.3
ApacheHTTP Server Version >= 2.0.0 <= 2.0.65
ApacheHTTP Server Version >= 2.2.0 <= 2.2.18
ApplemacOS X Version10.6.0
NetbsdNetbsd Version5.1
OpenbsdOpenbsd Version4.8
OracleSolaris Version10
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
DebianDebian Linux Version7.0
SuseLinux Enterprise Server Version10 Updatesp3 SwEdition-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 56.21% 0.98
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.

http://cxib.net/stuff/apache.fnmatch.phps
Patch
Third Party Advisory
http://marc.info/?l=bugtraq&m=131551295528105&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=131731002122529&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=132033751509019&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=134987041210674&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://secunia.com/advisories/44490
Vendor Advisory
Not Applicable
http://secunia.com/advisories/44564
Vendor Advisory
Not Applicable
http://secunia.com/advisories/44574
Vendor Advisory
Not Applicable
http://securityreason.com/securityalert/8246
Third Party Advisory
Exploit
http://securitytracker.com/id?1025527
Third Party Advisory
Broken Link
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=703390
Patch
Third Party Advisory
Issue Tracking