Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-1928

Опубликовано: 19 мая 2011
Источник: redhat
CVSS2: 2.6
EPSS Средний

Описание

The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Web Server 1 for RHEL 4 AShttpd22Not affected
Red Hat Enterprise Linux 4aprFixedRHSA-2011:084431.05.2011
Red Hat Enterprise Linux 5aprFixedRHSA-2011:084431.05.2011
Red Hat Enterprise Linux 6aprFixedRHSA-2011:084431.05.2011

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=706203apr: DoS flaw in apr_fnmatch() due to fix for CVE-2011-0419

EPSS

Процентиль: 94%
0.14392
Средний

2.6 Low

CVSS2

Связанные уязвимости

ubuntu
около 14 лет назад

The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.

nvd
около 14 лет назад

The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.

debian
около 14 лет назад

The fnmatch implementation in apr_fnmatch.c in the Apache Portable Run ...

github
около 3 лет назад

The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.

oracle-oval
около 14 лет назад

ELSA-2011-0844: apr security update (LOW)

EPSS

Процентиль: 94%
0.14392
Средний

2.6 Low

CVSS2