ID CVE-2011-0419
Summary Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:portable_runtime:0.9.1
    cpe:2.3:a:apache:portable_runtime:0.9.1
  • cpe:2.3:a:apache:portable_runtime:0.9.2
    cpe:2.3:a:apache:portable_runtime:0.9.2
  • cpe:2.3:a:apache:portable_runtime:0.9.2-dev
    cpe:2.3:a:apache:portable_runtime:0.9.2-dev
  • cpe:2.3:a:apache:portable_runtime:0.9.3
    cpe:2.3:a:apache:portable_runtime:0.9.3
  • cpe:2.3:a:apache:portable_runtime:0.9.3-dev
    cpe:2.3:a:apache:portable_runtime:0.9.3-dev
  • cpe:2.3:a:apache:portable_runtime:0.9.4
    cpe:2.3:a:apache:portable_runtime:0.9.4
  • cpe:2.3:a:apache:portable_runtime:0.9.5
    cpe:2.3:a:apache:portable_runtime:0.9.5
  • cpe:2.3:a:apache:portable_runtime:0.9.6
    cpe:2.3:a:apache:portable_runtime:0.9.6
  • cpe:2.3:a:apache:portable_runtime:0.9.7
    cpe:2.3:a:apache:portable_runtime:0.9.7
  • cpe:2.3:a:apache:portable_runtime:0.9.7-dev
    cpe:2.3:a:apache:portable_runtime:0.9.7-dev
  • cpe:2.3:a:apache:portable_runtime:0.9.8
    cpe:2.3:a:apache:portable_runtime:0.9.8
  • cpe:2.3:a:apache:portable_runtime:0.9.9
    cpe:2.3:a:apache:portable_runtime:0.9.9
  • cpe:2.3:a:apache:portable_runtime:0.9.16-dev
    cpe:2.3:a:apache:portable_runtime:0.9.16-dev
  • cpe:2.3:a:apache:portable_runtime:1.3.0
    cpe:2.3:a:apache:portable_runtime:1.3.0
  • cpe:2.3:a:apache:portable_runtime:1.3.1
    cpe:2.3:a:apache:portable_runtime:1.3.1
  • cpe:2.3:a:apache:portable_runtime:1.3.2
    cpe:2.3:a:apache:portable_runtime:1.3.2
  • cpe:2.3:a:apache:portable_runtime:1.3.3
    cpe:2.3:a:apache:portable_runtime:1.3.3
  • cpe:2.3:a:apache:portable_runtime:1.3.4
    cpe:2.3:a:apache:portable_runtime:1.3.4
  • cpe:2.3:a:apache:portable_runtime:1.3.4-dev
    cpe:2.3:a:apache:portable_runtime:1.3.4-dev
  • cpe:2.3:a:apache:portable_runtime:1.3.5
    cpe:2.3:a:apache:portable_runtime:1.3.5
  • cpe:2.3:a:apache:portable_runtime:1.3.6
    cpe:2.3:a:apache:portable_runtime:1.3.6
  • cpe:2.3:a:apache:portable_runtime:1.3.6-dev
    cpe:2.3:a:apache:portable_runtime:1.3.6-dev
  • cpe:2.3:a:apache:portable_runtime:1.3.7
    cpe:2.3:a:apache:portable_runtime:1.3.7
  • cpe:2.3:a:apache:portable_runtime:1.3.8
    cpe:2.3:a:apache:portable_runtime:1.3.8
  • cpe:2.3:a:apache:portable_runtime:1.3.9
    cpe:2.3:a:apache:portable_runtime:1.3.9
  • cpe:2.3:a:apache:portable_runtime:1.3.10
    cpe:2.3:a:apache:portable_runtime:1.3.10
  • cpe:2.3:a:apache:portable_runtime:1.3.11
    cpe:2.3:a:apache:portable_runtime:1.3.11
  • cpe:2.3:a:apache:portable_runtime:1.3.12
    cpe:2.3:a:apache:portable_runtime:1.3.12
  • cpe:2.3:a:apache:portable_runtime:1.3.13
    cpe:2.3:a:apache:portable_runtime:1.3.13
  • cpe:2.3:a:apache:portable_runtime:1.4.0
    cpe:2.3:a:apache:portable_runtime:1.4.0
  • cpe:2.3:a:apache:portable_runtime:1.4.1
    cpe:2.3:a:apache:portable_runtime:1.4.1
  • cpe:2.3:a:apache:portable_runtime:1.4.2
    cpe:2.3:a:apache:portable_runtime:1.4.2
  • Apache Software Foundation Apache HTTP Server 0.8.11
    cpe:2.3:a:apache:http_server:0.8.11
  • Apache Software Foundation Apache HTTP Server 0.8.14
    cpe:2.3:a:apache:http_server:0.8.14
  • Apache Software Foundation Apache HTTP Server 1.0
    cpe:2.3:a:apache:http_server:1.0
  • Apache Software Foundation Apache HTTP Server 1.0.2
    cpe:2.3:a:apache:http_server:1.0.2
  • Apache Software Foundation Apache HTTP Server 1.0.3
    cpe:2.3:a:apache:http_server:1.0.3
  • Apache Software Foundation Apache HTTP Server 1.0.5
    cpe:2.3:a:apache:http_server:1.0.5
  • Apache Software Foundation Apache HTTP Server 1.1
    cpe:2.3:a:apache:http_server:1.1
  • Apache Software Foundation Apache HTTP Server 1.1.1
    cpe:2.3:a:apache:http_server:1.1.1
  • Apache Software Foundation Apache 1.2
    cpe:2.3:a:apache:http_server:1.2
  • Apache Software Foundation Apache HTTP Server 1.2.4
    cpe:2.3:a:apache:http_server:1.2.4
  • Apache Software Foundation Apache HTTP Server 1.2.5
    cpe:2.3:a:apache:http_server:1.2.5
  • Apache Software Foundation Apache HTTP Server 1.2.6
    cpe:2.3:a:apache:http_server:1.2.6
  • Apache Software Foundation Apache 1.29
    cpe:2.3:a:apache:http_server:1.2.9
  • Apache Software Foundation Apache HTTP Server 1.3
    cpe:2.3:a:apache:http_server:1.3
  • Apache Software Foundation Apache HTTP Server 1.3.0
    cpe:2.3:a:apache:http_server:1.3.0
  • Apache Software Foundation Apache HTTP Server 1.3.1
    cpe:2.3:a:apache:http_server:1.3.1
  • Apache Software Foundation Apache HTTP Server 1.3.1.1
    cpe:2.3:a:apache:http_server:1.3.1.1
  • Apache Software Foundation Apache HTTP Server 1.3.2
    cpe:2.3:a:apache:http_server:1.3.2
  • Apache Software Foundation Apache HTTP Server 1.3.3
    cpe:2.3:a:apache:http_server:1.3.3
  • Apache Software Foundation Apache HTTP Server 1.3.4
    cpe:2.3:a:apache:http_server:1.3.4
  • Apache Software Foundation Apache HTTP Server 1.3.5
    cpe:2.3:a:apache:http_server:1.3.5
  • Apache Software Foundation Apache HTTP Server 1.3.6
    cpe:2.3:a:apache:http_server:1.3.6
  • Apache Software Foundation Apache HTTP Server 1.3.7
    cpe:2.3:a:apache:http_server:1.3.7
  • Apache Software Foundation Apache HTTP Server 1.3.8
    cpe:2.3:a:apache:http_server:1.3.8
  • Apache Software Foundation Apache HTTP Server 1.3.9
    cpe:2.3:a:apache:http_server:1.3.9
  • Apache Software Foundation Apache 1.3.10
    cpe:2.3:a:apache:http_server:1.3.10
  • Apache Software Foundation Apache HTTP Server 1.3.11
    cpe:2.3:a:apache:http_server:1.3.11
  • Apache Software Foundation Apache HTTP Server 1.3.12
    cpe:2.3:a:apache:http_server:1.3.12
  • Apache Software Foundation Apache 1.3.13
    cpe:2.3:a:apache:http_server:1.3.13
  • Apache Software Foundation Apache HTTP Server 1.3.14
    cpe:2.3:a:apache:http_server:1.3.14
  • Apache Software Foundation Apache 1.3.15
    cpe:2.3:a:apache:http_server:1.3.15
  • Apache Software Foundation Apache 1.3.16
    cpe:2.3:a:apache:http_server:1.3.16
  • Apache Software Foundation Apache HTTP Server 1.3.17
    cpe:2.3:a:apache:http_server:1.3.17
  • Apache Software Foundation Apache HTTP Server 1.3.18
    cpe:2.3:a:apache:http_server:1.3.18
  • Apache Software Foundation Apache HTTP Server 1.3.19
    cpe:2.3:a:apache:http_server:1.3.19
  • Apache Software Foundation Apache HTTP Server 1.3.20
    cpe:2.3:a:apache:http_server:1.3.20
  • Apache Software Foundation Apache HTTP Server 1.3.22
    cpe:2.3:a:apache:http_server:1.3.22
  • Apache Software Foundation Apache HTTP Server 1.3.23
    cpe:2.3:a:apache:http_server:1.3.23
  • Apache Software Foundation Apache HTTP Server 1.3.24
    cpe:2.3:a:apache:http_server:1.3.24
  • Apache Software Foundation Apache HTTP Server 1.3.25
    cpe:2.3:a:apache:http_server:1.3.25
  • Apache Software Foundation Apache HTTP Server 1.3.26
    cpe:2.3:a:apache:http_server:1.3.26
  • Apache Software Foundation Apache HTTP Server 1.3.27
    cpe:2.3:a:apache:http_server:1.3.27
  • Apache Software Foundation Apache HTTP Server 1.3.28
    cpe:2.3:a:apache:http_server:1.3.28
  • Apache Software Foundation Apache HTTP Server 1.3.29
    cpe:2.3:a:apache:http_server:1.3.29
  • Apache Software Foundation Apache HTTP Server 1.3.30
    cpe:2.3:a:apache:http_server:1.3.30
  • Apache Software Foundation Apache HTTP Server 1.3.31
    cpe:2.3:a:apache:http_server:1.3.31
  • Apache Software Foundation Apache HTTP Server 1.3.32
    cpe:2.3:a:apache:http_server:1.3.32
  • Apache Software Foundation Apache HTTP Server 1.3.33
    cpe:2.3:a:apache:http_server:1.3.33
  • Apache Software Foundation Apache HTTP Server 1.3.34
    cpe:2.3:a:apache:http_server:1.3.34
  • Apache Software Foundation Apache HTTP Server 1.3.35
    cpe:2.3:a:apache:http_server:1.3.35
  • Apache Software Foundation Apache HTTP Server 1.3.36
    cpe:2.3:a:apache:http_server:1.3.36
  • Apache Software Foundation Apache HTTP Server 1.3.37
    cpe:2.3:a:apache:http_server:1.3.37
  • Apache Software Foundation Apache HTTP Server 1.3.38
    cpe:2.3:a:apache:http_server:1.3.38
  • Apache Software Foundation Apache HTTP Server 1.3.39
    cpe:2.3:a:apache:http_server:1.3.39
  • Apache Software Foundation Apache HTTP Server 1.3.41
    cpe:2.3:a:apache:http_server:1.3.41
  • Apache Software Foundation Apache HTTP Server 1.3.42
    cpe:2.3:a:apache:http_server:1.3.42
  • Apache Software Foundation Apache HTTP Server 1.3.65
    cpe:2.3:a:apache:http_server:1.3.65
  • Apache Software Foundation Apache HTTP Server 1.3.68
    cpe:2.3:a:apache:http_server:1.3.68
  • Apache Software Foundation Apache HTTP Server 1.4.0
    cpe:2.3:a:apache:http_server:1.4.0
  • Apache Software Foundation Apache HTTP Server 1.99
    cpe:2.3:a:apache:http_server:1.99
  • Apache Software Foundation Apache HTTP Server 2.0
    cpe:2.3:a:apache:http_server:2.0
  • Apache Software Foundation Apache HTTP Server 2.0.9a
    cpe:2.3:a:apache:http_server:2.0.9
  • Apache Software Foundation Apache HTTP Server 2.0.28
    cpe:2.3:a:apache:http_server:2.0.28
  • Apache Software Foundation Apache HTTP Server 2.0.28 Beta
    cpe:2.3:a:apache:http_server:2.0.28:beta
  • Apache Software Foundation Apache HTTP Server 2.0.32
    cpe:2.3:a:apache:http_server:2.0.32
  • Apache Software Foundation Apache HTTP Server 2.0.32 Beta
    cpe:2.3:a:apache:http_server:2.0.32:beta
  • Apache Software Foundation Apache HTTP Server 2.0.34 Beta
    cpe:2.3:a:apache:http_server:2.0.34:beta
  • Apache Software Foundation Apache HTTP Server 2.0.35
    cpe:2.3:a:apache:http_server:2.0.35
  • Apache Software Foundation Apache HTTP Server 2.0.36
    cpe:2.3:a:apache:http_server:2.0.36
  • Apache Software Foundation Apache HTTP Server 2.0.37
    cpe:2.3:a:apache:http_server:2.0.37
  • Apache Software Foundation Apache HTTP Server 2.0.38
    cpe:2.3:a:apache:http_server:2.0.38
  • Apache Software Foundation Apache HTTP Server 2.0.39
    cpe:2.3:a:apache:http_server:2.0.39
  • Apache Software Foundation Apache HTTP Server 2.0.40
    cpe:2.3:a:apache:http_server:2.0.40
  • Apache Software Foundation Apache HTTP Server 2.0.41
    cpe:2.3:a:apache:http_server:2.0.41
  • Apache Software Foundation Apache HTTP Server 2.0.42
    cpe:2.3:a:apache:http_server:2.0.42
  • Apache Software Foundation Apache HTTP Server 2.0.43
    cpe:2.3:a:apache:http_server:2.0.43
  • Apache Software Foundation Apache HTTP Server 2.0.44
    cpe:2.3:a:apache:http_server:2.0.44
  • Apache Software Foundation Apache HTTP Server 2.0.45
    cpe:2.3:a:apache:http_server:2.0.45
  • Apache Software Foundation Apache HTTP Server 2.0.46
    cpe:2.3:a:apache:http_server:2.0.46
  • Apache Software Foundation Apache HTTP Server 2.0.47
    cpe:2.3:a:apache:http_server:2.0.47
  • Apache Software Foundation Apache HTTP Server 2.0.48
    cpe:2.3:a:apache:http_server:2.0.48
  • Apache Software Foundation Apache HTTP Server 2.0.49
    cpe:2.3:a:apache:http_server:2.0.49
  • Apache Software Foundation Apache HTTP Server 2.0.50
    cpe:2.3:a:apache:http_server:2.0.50
  • Apache Software Foundation Apache HTTP Server 2.0.51
    cpe:2.3:a:apache:http_server:2.0.51
  • Apache Software Foundation Apache HTTP Server 2.0.52
    cpe:2.3:a:apache:http_server:2.0.52
  • Apache Software Foundation Apache HTTP Server 2.0.53
    cpe:2.3:a:apache:http_server:2.0.53
  • Apache Software Foundation Apache HTTP Server 2.0.54
    cpe:2.3:a:apache:http_server:2.0.54
  • Apache Software Foundation Apache HTTP Server 2.0.55
    cpe:2.3:a:apache:http_server:2.0.55
  • Apache Software Foundation Apache HTTP Server 2.0.56
    cpe:2.3:a:apache:http_server:2.0.56
  • Apache Software Foundation Apache HTTP Server 2.0.57
    cpe:2.3:a:apache:http_server:2.0.57
  • Apache Software Foundation Apache HTTP Server 2.0.58
    cpe:2.3:a:apache:http_server:2.0.58
  • Apache Software Foundation HTTP Server 2.0.59
    cpe:2.3:a:apache:http_server:2.0.59
  • Apache Software Foundation Apache HTTP Server 2.0.60 dev
    cpe:2.3:a:apache:http_server:2.0.60
  • Apache Software Foundation HTTP Server 2.0.61
    cpe:2.3:a:apache:http_server:2.0.61
  • Apache Software Foundation Apache HTTP Server 2.0.63
    cpe:2.3:a:apache:http_server:2.0.63
  • Apache Software Foundation Apache HTTP Server 2.1
    cpe:2.3:a:apache:http_server:2.1
  • Apache Software Foundation Apache HTTP Server 2.1.1
    cpe:2.3:a:apache:http_server:2.1.1
  • Apache Software Foundation Apache HTTP Server 2.1.2
    cpe:2.3:a:apache:http_server:2.1.2
  • Apache Software Foundation Apache HTTP Server 2.1.3
    cpe:2.3:a:apache:http_server:2.1.3
  • Apache Software Foundation Apache HTTP Server 2.1.4
    cpe:2.3:a:apache:http_server:2.1.4
  • Apache Software Foundation Apache HTTP Server 2.1.5
    cpe:2.3:a:apache:http_server:2.1.5
  • Apache Software Foundation Apache HTTP Server 2.1.6
    cpe:2.3:a:apache:http_server:2.1.6
  • Apache Software Foundation Apache HTTP Server 2.1.7
    cpe:2.3:a:apache:http_server:2.1.7
  • Apache Software Foundation Apache HTTP Server 2.1.8
    cpe:2.3:a:apache:http_server:2.1.8
  • Apache Software Foundation Apache HTTP Server 2.1.9
    cpe:2.3:a:apache:http_server:2.1.9
  • Apache Software Foundation Apache HTTP Server 2.2
    cpe:2.3:a:apache:http_server:2.2
  • Apache Software Foundation Apache HTTP Server 2.2.0
    cpe:2.3:a:apache:http_server:2.2.0
  • Apache Software Foundation Apache HTTP Server 2.2.1
    cpe:2.3:a:apache:http_server:2.2.1
  • Apache Software Foundation Apache HTTP Server 2.2.2
    cpe:2.3:a:apache:http_server:2.2.2
  • Apache Software Foundation Apache HTTP Server 2.2.3
    cpe:2.3:a:apache:http_server:2.2.3
  • Apache Software Foundation Apache HTTP Server 2.2.4
    cpe:2.3:a:apache:http_server:2.2.4
  • Apache Software Foundation Apache HTTP Server 2.2.6
    cpe:2.3:a:apache:http_server:2.2.6
  • Apache Software Foundation Apache HTTP Server 2.2.8
    cpe:2.3:a:apache:http_server:2.2.8
  • Apache Software Foundation Apache HTTP Server 2.2.9
    cpe:2.3:a:apache:http_server:2.2.9
  • Apache Software Foundation Apache HTTP Server 2.2.10
    cpe:2.3:a:apache:http_server:2.2.10
  • Apache Software Foundation Apache HTTP Server 2.2.11
    cpe:2.3:a:apache:http_server:2.2.11
  • Apache Software Foundation Apache HTTP Server 2.2.12
    cpe:2.3:a:apache:http_server:2.2.12
  • Apache Software Foundation Apache HTTP Server 2.2.13
    cpe:2.3:a:apache:http_server:2.2.13
  • Apache Software Foundation Apache HTTP Server 2.2.14
    cpe:2.3:a:apache:http_server:2.2.14
  • Apache Software Foundation Apache HTTP Server 2.2.15
    cpe:2.3:a:apache:http_server:2.2.15
  • Apache Software Foundation Apache HTTP Server 2.2.16
    cpe:2.3:a:apache:http_server:2.2.16
  • Apache Software Foundation Apache HTTP Server 2.2.17
    cpe:2.3:a:apache:http_server:2.2.17
  • Apple Mac OS X 10.6.0
    cpe:2.3:o:apple:mac_os_x:10.6.0
  • FreeBSD
    cpe:2.3:o:freebsd:freebsd
  • Google Android Operating System
    cpe:2.3:o:google:android
  • NetBSD 5.1
    cpe:2.3:o:netbsd:netbsd:5.1
  • OpenBSD 4.8
    cpe:2.3:o:openbsd:openbsd:4.8
  • Oracle Solaris 10
    cpe:2.3:o:oracle:solaris:10
CVSS
Base: 4.3 (as of 16-05-2011 - 15:24)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
exploit-db via4
description Apache 1.4/2.2.x APR 'apr_fnmatch()' Denial of Service Vulnerability. CVE-2011-0419. Dos exploit for linux platform
id EDB-ID:35738
last seen 2016-02-04
modified 2011-05-12
published 2011-05-12
reporter Maksymilian Arciemowicz
source https://www.exploit-db.com/download/35738/
title Apache 1.4/2.2.x APR 'apr_fnmatch' Denial of Service Vulnerability
nessus via4
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1134-1.NASL
    description Maksymilian Arciemowicz reported that a flaw in the fnmatch() implementation in the Apache Portable Runtime (APR) library could allow an attacker to cause a denial of service. This can be demonstrated in a remote denial of service attack against mod_autoindex in the Apache web server. (CVE-2011-0419) Is was discovered that the fix for CVE-2011-0419 introduced a different flaw in the fnmatch() implementation that could also result in a denial of service. (CVE-2011-1928). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 55095
    published 2011-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55095
    title Ubuntu 6.06 LTS / 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : apache2, apr vulnerabilities (USN-1134-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_38560D790E4211E1902B20CF30E32F6D.NASL
    description The Apache Portable Runtime Project reports : Reimplement apr_fnmatch() from scratch using a non-recursive algorithm; now has improved compliance with the fnmatch() spec.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 56805
    published 2011-11-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56805
    title FreeBSD : Apache APR -- DoS vulnerabilities (38560d79-0e42-11e1-902b-20cf30e32f6d)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2011-0507.NASL
    description Updated apr packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines. It was discovered that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching. (CVE-2011-0419) Red Hat would like to thank Maksymilian Arciemowicz for reporting this issue. All apr users should upgrade to these updated packages, which contain a backported patch to correct this issue. Applications using the apr library, such as httpd, must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 53872
    published 2011-05-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53872
    title CentOS 4 / 5 : apr (CESA-2011:0507)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20110511_APR_ON_SL4_X.NASL
    description It was discovered that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching. (CVE-2011-0419) Applications using the apr library, such as httpd, must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61036
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61036
    title Scientific Linux Security Update : apr on SL4.x, SL5.x, SL6.x i386/x86_64
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201405-24.NASL
    description The remote host is affected by the vulnerability described in GLSA-201405-24 (Apache Portable Runtime, APR Utility Library: Denial of Service) Multiple vulnerabilities have been discovered in Apache Portable Runtime and APR Utility Library. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-13
    plugin id 74066
    published 2014-05-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74066
    title GLSA-201405-24 : Apache Portable Runtime, APR Utility Library: Denial of Service
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-7340.NASL
    description Move to 1.4.x branch. Various bug fixes since 1.4.2. Security: CVE-2011-0419 Reimplement apr_fnmatch() from scratch using a non-recursive algorithm; now has improved compliance with the fnmatch() spec. Note: 1.4.3 was never officially released. Fix CVE-2011-1928 introduced in 1.4.4. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 54958
    published 2011-06-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54958
    title Fedora 13 : apr-1.4.5-1.fc13 (2011-7340)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2011-0844.NASL
    description Updated apr packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines. The fix for CVE-2011-0419 (released via RHSA-2011:0507) introduced an infinite loop flaw in the apr_fnmatch() function when the APR_FNM_PATHNAME matching flag was used. A remote attacker could possibly use this flaw to cause a denial of service on an application using the apr_fnmatch() function. (CVE-2011-1928) Note: This problem affected httpd configurations using the 'Location' directive with wildcard URLs. The denial of service could have been triggered during normal operation; it did not specifically require a malicious HTTP request. This update also addresses additional problems introduced by the rewrite of the apr_fnmatch() function, which was necessary to address the CVE-2011-0419 flaw. All apr users should upgrade to these updated packages, which contain a backported patch to correct this issue. Applications using the apr library, such as httpd, must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 54938
    published 2011-06-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54938
    title CentOS 4 / 5 : apr (CESA-2011:0844)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_LIBAPR-UTIL1-110706.NASL
    description This update fixes the following security issues : - 650435: remote DoS in APR. (CVE-2010-1623) - 693778: unconstrained recursion when processing patterns (CVE-2011-0419 / CVE-2011-1928)
    last seen 2019-02-21
    modified 2015-01-15
    plugin id 55564
    published 2011-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55564
    title SuSE 11.1 Security Update : libapr (SAT Patch Number 4845)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_APACHE2-110726.NASL
    description This update fixes : - CVE-2011-0419 and CVE-2011-1928: unconstrained recursion when processing patterns - CVE-2010-1623: a remote DoS (memory leak) in APR's reqtimeout_filter function
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75424
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75424
    title openSUSE Security Update : apache2 (openSUSE-SU-2011:0859-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_LIBAPR-UTIL1-7611.NASL
    description This update fixes the following security issues : - 650435: remote DoS in APR. (CVE-2010-1623) - 693778: unconstrained recursion when processing patterns. (CVE-2011-0419 / CVE-2011-1928)
    last seen 2019-02-21
    modified 2015-01-15
    plugin id 55566
    published 2011-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55566
    title SuSE 10 Security Update : libapr (ZYPP Patch Number 7611)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2011-084.NASL
    description It was discovered that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching (CVE-2011-0419). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149 products_id=490 The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 53908
    published 2011-05-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53908
    title Mandriva Linux Security Advisory : apr (MDVSA-2011:084)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_00B296B67DB111E096B700300582F9FC.NASL
    description The Apache Portable Runtime Project reports : Note especially a security fix to APR 1.4.4, excessive CPU consumption was possible due to an unconstrained, recursive invocation of apr_fnmatch, as apr_fnmatch processed '*' wildcards. Reimplement apr_fnmatch() from scratch using a non-recursive algorithm now has improved compliance with the fnmatch() spec. (William Rowe)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 53905
    published 2011-05-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53905
    title FreeBSD : Apache APR -- DoS vulnerabilities (00b296b6-7db1-11e0-96b7-00300582f9fc)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_LIBAPR1-7610.NASL
    description This update fixes the following security issue : - 693778: unconstrained recursion when processing patterns. (CVE-2011-0419 / CVE-2011-1928)
    last seen 2019-02-21
    modified 2015-01-15
    plugin id 57215
    published 2011-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57215
    title SuSE 10 Security Update : libapr1 (ZYPP Patch Number 7610)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-6750.NASL
    description Various bug fixes since 1.4.2. Security: CVE-2011-0419 Reimplement apr_fnmatch() from scratch using a non-recursive algorithm; now has improved compliance with the fnmatch() spec. Note: 1.4.3 was never officially released. Release -2 should fix top_builddir problem from -1. Fix CVE-2011-1928 introduced in 1.4.4. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 54944
    published 2011-06-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54944
    title Fedora 15 : apr-1.4.5-1.fc15 (2011-6750)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-0844.NASL
    description Updated apr packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines. The fix for CVE-2011-0419 (released via RHSA-2011:0507) introduced an infinite loop flaw in the apr_fnmatch() function when the APR_FNM_PATHNAME matching flag was used. A remote attacker could possibly use this flaw to cause a denial of service on an application using the apr_fnmatch() function. (CVE-2011-1928) Note: This problem affected httpd configurations using the 'Location' directive with wildcard URLs. The denial of service could have been triggered during normal operation; it did not specifically require a malicious HTTP request. This update also addresses additional problems introduced by the rewrite of the apr_fnmatch() function, which was necessary to address the CVE-2011-0419 flaw. All apr users should upgrade to these updated packages, which contain a backported patch to correct this issue. Applications using the apr library, such as httpd, must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 54932
    published 2011-06-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54932
    title RHEL 4 / 5 / 6 : apr (RHSA-2011:0844)
  • NASL family Web Servers
    NASL id ORACLE_HTTP_SERVER_CPU_JUL_2013.NASL
    description According to its banner, the version of Oracle HTTP Server installed on the remote host is potentially affected by multiple vulnerabilities. Note that Nessus did not verify if patches or workarounds have been applied.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 69301
    published 2013-08-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69301
    title Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities
  • NASL family Web Servers
    NASL id HPSMH_7_0_0_24.NASL
    description According to the web server's banner, the version of HP System Management Homepage (SMH) hosted on the remote host is earlier than 7.0. As such, it is reportedly affected by the following vulnerabilities : - An error exists in the 'generate-id' function in the bundled libxslt library that can allow disclosure of heap memory addresses. (CVE-2011-0195) - An unspecified input validation error exists and can allow cross-site request forgery attacks. (CVE-2011-3846) - Unspecified errors can allow attackers to carry out denial of service attacks via unspecified vectors. (CVE-2012-0135, CVE-2012-1993) - The bundled version of PHP contains multiple vulnerabilities. (CVE-2010-3436, CVE-2010-4409, CVE-2010-4645, CVE-2011-1148, CVE-2011-1153, CVE-2011-1464, CVE-2011-1467, CVE-2011-1468, CVE-2011-1470, CVE-2011-1471, CVE-2011-1938, CVE-2011-2202, CVE-2011-2483, CVE-2011-3182, CVE-2011-3189, CVE-2011-3267, CVE-2011-3268) - The bundled version of Apache contains multiple vulnerabilities. (CVE-2010-1452, CVE-2010-1623, CVE-2010-2068, CVE-2010-2791, CVE-2011-0419, CVE-2011-1928, CVE-2011-3192, CVE-2011-3348, CVE-2011-3368, CVE-2011-3639) - OpenSSL libraries are contained in several of the bundled components and contain multiple vulnerabilities. (CVE-2011-0014, CVE-2011-1468, CVE-2011-1945, CVE-2011-3207,CVE-2011-3210) - Curl libraries are contained in several of the bundled components and contain multiple vulnerabilities. (CVE-2009-0037, CVE-2010-0734, CVE-2011-2192)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 58811
    published 2012-04-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58811
    title HP System Management Homepage < 7.0 Multiple Vulnerabilities
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2011-0507.NASL
    description From Red Hat Security Advisory 2011:0507 : Updated apr packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines. It was discovered that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching. (CVE-2011-0419) Red Hat would like to thank Maksymilian Arciemowicz for reporting this issue. All apr users should upgrade to these updated packages, which contain a backported patch to correct this issue. Applications using the apr library, such as httpd, must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68275
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68275
    title Oracle Linux 4 / 5 / 6 : apr (ELSA-2011-0507)
  • NASL family F5 Networks Local Security Checks
    NASL id F5_BIGIP_SOL15920.NASL
    description Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
    last seen 2019-02-21
    modified 2019-01-04
    plugin id 80108
    published 2014-12-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80108
    title F5 Networks BIG-IP : Apache vulnerability (SOL15920)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2237.NASL
    description A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. If a directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 53900
    published 2011-05-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53900
    title Debian DSA-2237-1 : apr - denial of service
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_147714-01.NASL
    description Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Library/libc). Supported versions that are affected are 9 and 10. Difficult to exploit vulnerability allows successful unauthenticated network attacks via TCP/IP. Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris.
    last seen 2019-02-21
    modified 2018-10-29
    plugin id 108114
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108114
    title Solaris 10 (x86) : 147714-01
  • NASL family Web Servers
    NASL id APACHE_2_2_18.NASL
    description According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.18. It is, therefore, affected by a denial of service vulnerability due to an error in the apr_fnmatch() function of the bundled APR library. If mod_autoindex is enabled and has indexed a directory containing files whose filenames are long, an attacker can cause high CPU usage with a specially crafted request. Note that the remote web server may not actually be affected by this vulnerability. Nessus did not try to determine whether the affected module is in use or to check for the issue itself.
    last seen 2019-02-21
    modified 2018-06-29
    plugin id 53896
    published 2011-05-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53896
    title Apache 2.2.x < 2.2.18 APR apr_fnmatch DoS
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2011-133-01.NASL
    description New apr and apr-util packages are available for Slackware 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix a security issue.
    last seen 2019-02-21
    modified 2018-06-27
    plugin id 53898
    published 2011-05-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53898
    title Slackware 11.0 / 12.0 / 12.1 / 12.2 / 13.0 / 13.1 / 13.37 / current : apr/apr-util (SSA:2011-133-01)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-0507.NASL
    description Updated apr packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines. It was discovered that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching. (CVE-2011-0419) Red Hat would like to thank Maksymilian Arciemowicz for reporting this issue. All apr users should upgrade to these updated packages, which contain a backported patch to correct this issue. Applications using the apr library, such as httpd, must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 53874
    published 2011-05-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53874
    title RHEL 4 / 5 / 6 : apr (RHSA-2011:0507)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20110531_APR_ON_SL6_X.NASL
    description The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines. The fix for CVE-2011-0419 introduced an infinite loop flaw in the apr_fnmatch() function when the APR_FNM_PATHNAME matching flag was used. A remote attacker could possibly use this flaw to cause a denial of service on an application using the apr_fnmatch() function. (CVE-2011-1928) Note: This problem affected httpd configurations using the 'Location' directive with wildcard URLs. The denial of service could have been triggered during normal operation; it did not specifically require a malicious HTTP request. This update also addresses additional problems introduced by the rewrite of the apr_fnmatch() function, which was necessary to address the CVE-2011-0419 flaw. All apr users should upgrade to these updated packages, which contain a backported patch to correct this issue. Applications using the apr library, such as httpd, must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61053
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61053
    title Scientific Linux Security Update : apr on SL6.x i386/x86_64
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-6918.NASL
    description Move to 1.4.x branch. Various bug fixes since 1.4.2. Security: CVE-2011-0419 Reimplement apr_fnmatch() from scratch using a non-recursive algorithm; now has improved compliance with the fnmatch() spec. Note: 1.4.3 was never officially released. Fix CVE-2011-1928 introduced in 1.4.4. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 54957
    published 2011-06-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54957
    title Fedora 14 : apr-1.4.5-1.fc14 (2011-6918)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_99A5590C857E11E096B700300582F9FC.NASL
    description The Apache Portable Runtime Project reports : A flaw was discovered in the apr_fnmatch() function in the Apache Portable Runtime (APR) library 1.4.4 (or any backported versions that contained the upstream fix for CVE-2011-0419). This could cause httpd workers to enter a hung state (100% CPU utilization). apr-util 1.3.11 could cause crashes with httpd's mod_authnz_ldap in some situations.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 54623
    published 2011-05-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54623
    title FreeBSD : Apache APR -- DoS vulnerabilities (99a5590c-857e-11e0-96b7-00300582f9fc)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2011-0844.NASL
    description From Red Hat Security Advisory 2011:0844 : Updated apr packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines. The fix for CVE-2011-0419 (released via RHSA-2011:0507) introduced an infinite loop flaw in the apr_fnmatch() function when the APR_FNM_PATHNAME matching flag was used. A remote attacker could possibly use this flaw to cause a denial of service on an application using the apr_fnmatch() function. (CVE-2011-1928) Note: This problem affected httpd configurations using the 'Location' directive with wildcard URLs. The denial of service could have been triggered during normal operation; it did not specifically require a malicious HTTP request. This update also addresses additional problems introduced by the rewrite of the apr_fnmatch() function, which was necessary to address the CVE-2011-0419 flaw. All apr users should upgrade to these updated packages, which contain a backported patch to correct this issue. Applications using the apr library, such as httpd, must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68284
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68284
    title Oracle Linux 4 / 5 / 6 : apr (ELSA-2011-0844)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_LIBAPR-UTIL1-110701.NASL
    description This update fixes the following security issues : - 650435: remote DoS in APR. (CVE-2010-1623) - 693778: unconstrained recursion when processing patterns (CVE-2011-0419 / CVE-2011-1928)
    last seen 2019-02-21
    modified 2015-01-15
    plugin id 55563
    published 2011-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55563
    title SuSE 11.1 Security Update : libapr (SAT Patch Number 4845)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2011-006.NASL
    description The remote host is running a version of Mac OS X 10.6 that does not have Security Update 2011-006 applied. This update contains numerous security-related fixes for the following components : - Apache - Application Firewall - ATS - BIND - Certificate Trust Policy - CFNetwork - CoreFoundation - CoreMedia - File Systems - IOGraphics - iChat Server - Mailman - MediaKit - PHP - postfix - python - QuickTime - Tomcat - User Documentation - Web Server - X11
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 56481
    published 2011-10-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56481
    title Mac OS X Multiple Vulnerabilities (Security Update 2011-006)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_147713-01.NASL
    description Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Library/libc). Supported versions that are affected are 9 and 10. Difficult to exploit vulnerability allows successful unauthenticated network attacks via TCP/IP. Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris.
    last seen 2019-02-21
    modified 2018-10-26
    plugin id 107622
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107622
    title Solaris 10 (sparc) : 147713-01
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_APACHE2-110726.NASL
    description This update fixes : - CVE-2011-0419 and CVE-2011-1928: unconstrained recursion when processing patterns - CVE-2010-1623: a remote DoS (memory leak) in APR's reqtimeout_filter function
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75785
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75785
    title openSUSE Security Update : apache2 (openSUSE-SU-2011:0859-1)
  • NASL family Misc.
    NASL id JUNIPER_NSM_JSA10642.NASL
    description The remote host has one or more instances of NSM (Network and Security Manager) Server running, with version(s) prior to 2012.2R9. It is, therefore, affected by multiple vulnerabilities related to its Java and Apache installations.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 77326
    published 2014-08-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=77326
    title Juniper NSM < 2012.2R9 Multiple Java and Apache Vulnerabilities (JSA10642)
oval via4
  • accepted 2015-04-20T04:00:40.522-04:00
    class vulnerability
    contributors
    • name Yamini Mohan R
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
    family unix
    id oval:org.mitre.oval:def:14638
    status accepted
    submitted 2012-01-30T14:02:48.000-05:00
    title HP-UX Apache Web Server, Remote Denial of Service (DoS)
    version 45
  • accepted 2015-04-20T04:00:42.298-04:00
    class vulnerability
    contributors
    • name Yamini Mohan R
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
    family unix
    id oval:org.mitre.oval:def:14804
    status accepted
    submitted 2012-01-30T13:51:10.000-05:00
    title HP-UX Apache Web Server, Remote Denial of Service (DoS)
    version 44
redhat via4
advisories
  • bugzilla
    id 703390
    title CVE-2011-0419 apr: unconstrained recursion in apr_fnmatch
    oval
    OR
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304001
      • OR
        • AND
          • comment apr is earlier than 0:0.9.4-25.el4
            oval oval:com.redhat.rhsa:tst:20110507002
          • comment apr is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20091204003
        • AND
          • comment apr-devel is earlier than 0:0.9.4-25.el4
            oval oval:com.redhat.rhsa:tst:20110507004
          • comment apr-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20091204005
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331001
      • OR
        • AND
          • comment apr is earlier than 0:1.2.7-11.el5_6.4
            oval oval:com.redhat.rhsa:tst:20110507007
          • comment apr is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091204012
        • AND
          • comment apr-devel is earlier than 0:1.2.7-11.el5_6.4
            oval oval:com.redhat.rhsa:tst:20110507009
          • comment apr-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091204014
        • AND
          • comment apr-docs is earlier than 0:1.2.7-11.el5_6.4
            oval oval:com.redhat.rhsa:tst:20110507011
          • comment apr-docs is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091204016
    • AND
      • OR
        • comment Red Hat Enterprise Linux 6 Client is installed
          oval oval:com.redhat.rhba:tst:20111656001
        • comment Red Hat Enterprise Linux 6 Server is installed
          oval oval:com.redhat.rhba:tst:20111656002
        • comment Red Hat Enterprise Linux 6 Workstation is installed
          oval oval:com.redhat.rhba:tst:20111656003
        • comment Red Hat Enterprise Linux 6 ComputeNode is installed
          oval oval:com.redhat.rhba:tst:20111656004
      • OR
        • AND
          • comment apr is earlier than 0:1.3.9-3.el6_0.1
            oval oval:com.redhat.rhsa:tst:20110507017
          • comment apr is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20110507018
        • AND
          • comment apr-devel is earlier than 0:1.3.9-3.el6_0.1
            oval oval:com.redhat.rhsa:tst:20110507019
          • comment apr-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20110507020
    rhsa
    id RHSA-2011:0507
    released 2011-05-11
    severity Moderate
    title RHSA-2011:0507: apr security update (Moderate)
  • rhsa
    id RHSA-2011:0896
  • rhsa
    id RHSA-2011:0897
rpms
  • apr-0:0.9.4-25.el4
  • apr-devel-0:0.9.4-25.el4
  • apr-0:1.2.7-11.el5_6.4
  • apr-devel-0:1.2.7-11.el5_6.4
  • apr-docs-0:1.2.7-11.el5_6.4
  • apr-0:1.3.9-3.el6_0.1
  • apr-devel-0:1.3.9-3.el6_0.1
refmap via4
apple APPLE-SA-2011-10-12-3
confirm
debian DSA-2237
hp
  • HPSBMU02704
  • HPSBOV02822
  • HPSBUX02702
  • HPSBUX02707
  • SSRT100606
  • SSRT100619
  • SSRT100626
  • SSRT100966
mandriva
  • MDVSA-2011:084
  • MDVSA-2013:150
misc
mlist
  • [dev] 20110510 Re: Apache Portable Runtime 1.4.4 [...] Released
  • [dev] 20110510 Re: fnmatch rewrite in apr, apr 1.4.3
  • [dev] 20110511 Re: Apache Portable Runtime 1.4.4 [...] Released
sectrack 1025527
secunia
  • 44490
  • 44564
  • 44574
  • 48308
sreason 8246
sreasonres 20110512 Multiple Vendors libc/fnmatch(3) DoS (incl apache)
suse SUSE-SU-2011:1229
Last major update 15-11-2013 - 00:31
Published 16-05-2011 - 13:55
Last modified 05-01-2018 - 21:29
Back to Top