Vulnerability Description
Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Portable Runtime | < 1.4.3 |
| Apache | Http Server | >= 2.0.0, <= 2.0.65 |
| Apple | Mac Os X | 10.6.0 |
| Freebsd | Freebsd | All versions |
| Android | All versions | |
| Netbsd | Netbsd | 5.1 |
| Openbsd | Openbsd | 4.8 |
| Oracle | Solaris | 10 |
| Debian | Debian Linux | 5.0 |
| Suse | Linux Enterprise Server | 10 |
Related Weaknesses (CWE)
References
- http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/fnmatch.c#rev1.22Third Party Advisory
- http://cxib.net/stuff/apache.fnmatch.phpsPatchThird Party Advisory
- http://cxib.net/stuff/apr_fnmatch.txtsThird Party Advisory
- http://httpd.apache.org/security/vulnerabilities_22.htmlVendor Advisory
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlBroken Link
- http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.htmlMailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=131551295528105&w=2Issue TrackingMailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=131731002122529&w=2Issue TrackingMailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=132033751509019&w=2Issue TrackingMailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=134987041210674&w=2Issue TrackingMailing ListThird Party Advisory
- http://secunia.com/advisories/44490Not ApplicableVendor Advisory
- http://secunia.com/advisories/44564Not ApplicableVendor Advisory
- http://secunia.com/advisories/44574Not ApplicableVendor Advisory
- http://secunia.com/advisories/48308Not Applicable
- http://securityreason.com/achievement_securityalert/98ExploitThird Party Advisory
FAQ
What is CVE-2011-0419?
CVE-2011-0419 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in l...
How severe is CVE-2011-0419?
CVE-2011-0419 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0419?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Portable Runtime, Apache Http Server, Apple Mac Os X, Freebsd Freebsd, Google Android.