Computer Security
[EN] securityvulns.ru no-pyccku


apr / Apache mod_autoindex DoS
updated since 16.05.2011
Published:21.05.2011
Source:
SecurityVulns ID:11676
Type:remote
Threat Level:
5/10
Description:CPU resources exhaustion on request to indexed files with long names.
Affected:APACHE : apr 1.4
CVE:CVE-2011-1928 (The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.)
 CVE-2011-0419 (Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.)
Original documentdocumentMANDRIVA, [ MDVSA-2011:095 ] apr (21.05.2011)
 documentMaksymilian Arciemowicz, Multiple Vendors libc/fnmatch(3) DoS (incl apache poc) (16.05.2011)
 documentDEBIAN, [SECURITY] [DSA 2237-1] apr security update (16.05.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod