Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-0419

Опубликовано: 16 мая 2011
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 4.3

Описание

Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.

РелизСтатусПримечание
dapper

released

2.0.55-4ubuntu2.13
devel

not-affected

uses system apr
hardy

not-affected

uses system apr
lucid

not-affected

uses system apr
maverick

not-affected

uses system apr
natty

not-affected

uses system apr
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

1.4.5-1
hardy

released

1.2.11-1ubuntu0.2
lucid

released

1.3.8-1ubuntu0.3
maverick

released

1.4.2-3ubuntu1.1
natty

released

1.4.2-7ubuntu2.1
upstream

released

1.4.4-1

Показывать по

EPSS

Процентиль: 98%
0.54356
Средний

4.3 Medium

CVSS2

Связанные уязвимости

redhat
больше 14 лет назад

Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.

nvd
около 14 лет назад

Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.

debian
около 14 лет назад

Stack consumption vulnerability in the fnmatch implementation in apr_f ...

github
больше 3 лет назад

Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.

oracle-oval
больше 14 лет назад

ELSA-2011-0507: apr security update (MODERATE)

EPSS

Процентиль: 98%
0.54356
Средний

4.3 Medium

CVSS2