Lucene search

K
freebsdFreeBSD00B296B6-7DB1-11E0-96B7-00300582F9FC
HistoryMay 10, 2011 - 12:00 a.m.

Apache APR -- DoS vulnerabilities

2011-05-1000:00:00
vuxml.freebsd.org
11

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.968 High

EPSS

Percentile

99.7%

The Apache Portable Runtime Project reports:

Note especially a security fix to APR 1.4.4, excessive CPU
consumption was possible due to an unconstrained, recursive
invocation of apr_fnmatch, as apr_fnmatch processed ‘*’ wildcards.
Reimplement apr_fnmatch() from scratch using a non-recursive
algorithm now has improved compliance with the fnmatch() spec.
(William Rowe)

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchapr1< 1.4.4.1.3.11UNKNOWN

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.968 High

EPSS

Percentile

99.7%