1.2
CVE-2011-4415
- EPSS 0.67%
- Published 08.11.2011 11:55:05
- Last modified 11.04.2025 00:51:21
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607.
Data is provided by the National Vulnerability Database (NVD)
Apache ≫ HTTP Server Version2.0
Apache ≫ HTTP Server Version2.0.9
Apache ≫ HTTP Server Version2.0.28
Apache ≫ HTTP Server Version2.0.28 Updatebeta
Apache ≫ HTTP Server Version2.0.32
Apache ≫ HTTP Server Version2.0.32 Updatebeta
Apache ≫ HTTP Server Version2.0.34 Updatebeta
Apache ≫ HTTP Server Version2.0.35
Apache ≫ HTTP Server Version2.0.36
Apache ≫ HTTP Server Version2.0.37
Apache ≫ HTTP Server Version2.0.38
Apache ≫ HTTP Server Version2.0.39
Apache ≫ HTTP Server Version2.0.40
Apache ≫ HTTP Server Version2.0.41
Apache ≫ HTTP Server Version2.0.42
Apache ≫ HTTP Server Version2.0.43
Apache ≫ HTTP Server Version2.0.44
Apache ≫ HTTP Server Version2.0.45
Apache ≫ HTTP Server Version2.0.46
Apache ≫ HTTP Server Version2.0.47
Apache ≫ HTTP Server Version2.0.48
Apache ≫ HTTP Server Version2.0.49
Apache ≫ HTTP Server Version2.0.50
Apache ≫ HTTP Server Version2.0.51
Apache ≫ HTTP Server Version2.0.52
Apache ≫ HTTP Server Version2.0.53
Apache ≫ HTTP Server Version2.0.54
Apache ≫ HTTP Server Version2.0.55
Apache ≫ HTTP Server Version2.0.56
Apache ≫ HTTP Server Version2.0.57
Apache ≫ HTTP Server Version2.0.58
Apache ≫ HTTP Server Version2.0.59
Apache ≫ HTTP Server Version2.0.60
Apache ≫ HTTP Server Version2.0.61
Apache ≫ HTTP Server Version2.0.63
Apache ≫ HTTP Server Version2.0.64
Apache ≫ HTTP Server Version2.2.0
Apache ≫ HTTP Server Version2.2.1
Apache ≫ HTTP Server Version2.2.2
Apache ≫ HTTP Server Version2.2.3
Apache ≫ HTTP Server Version2.2.4
Apache ≫ HTTP Server Version2.2.6
Apache ≫ HTTP Server Version2.2.8
Apache ≫ HTTP Server Version2.2.9
Apache ≫ HTTP Server Version2.2.10
Apache ≫ HTTP Server Version2.2.11
Apache ≫ HTTP Server Version2.2.12
Apache ≫ HTTP Server Version2.2.13
Apache ≫ HTTP Server Version2.2.14
Apache ≫ HTTP Server Version2.2.15
Apache ≫ HTTP Server Version2.2.16
Apache ≫ HTTP Server Version2.2.18
Apache ≫ HTTP Server Version2.2.19
Apache ≫ HTTP Server Version2.2.20
Apache ≫ HTTP Server Version2.2.21
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.67% | 0.705 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 1.2 | 1.9 | 2.9 |
AV:L/AC:H/Au:N/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.