CVE-2011-0419

Source
https://nvd.nist.gov/vuln/detail/CVE-2011-0419
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-0419.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-0419
Related
Published
2011-05-16T17:55:02Z
Modified
2024-06-30T12:01:22Z
Summary
[none]
Details

Stack consumption vulnerability in the fnmatch implementation in aprfnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against modautoindex in httpd.

References

Affected packages

Debian:11 / apr

Package

Name
apr
Purl
pkg:deb/debian/apr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.4-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / apr

Package

Name
apr
Purl
pkg:deb/debian/apr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.4-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / apr

Package

Name
apr
Purl
pkg:deb/debian/apr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.4-1

Ecosystem specific

{
    "urgency": "low"
}