First published: Tue May 10 2011(Updated: )
Apache Portable Runtime (APR) is vulnerable to a denial of service, caused by an error in the apr_fnmatch() function when processing specific patterns with the "*" wildcard. A remote attacker could exploit this vulnerability to consume all available CPU and memory resources resulting in a denial of service.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Portable Runtime | <=1.4.3 | |
Apache HTTP server | >=2.0.35<=2.0.65 | |
Apache HTTP server | >=2.2.0<2.2.19 | |
NetBSD NetBSD | =5.1 | |
Google Android | ||
FreeBSD FreeBSD | ||
Openbsd Openbsd | =4.8 | |
Apple Mac OS X | =10.6.0 | |
Oracle Solaris | =10 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =6.0 | |
SUSE Linux Enterprise Server | =10-sp3 | |
Apache Portable Runtime | <1.4.3 | |
Apache HTTP server | >=2.0.0<=2.0.65 | |
Apache HTTP server | >=2.2.0<=2.2.18 | |
IBM Engineering Requirements Management DOORS | <=9.7.2.8 | |
IBM Engineering Requirements Management DOORS Web Access | <=9.7.2.8 | |
IBM IBM® Rational DOORS/DOORS Web Access | <=9.6.1.x |
http://svn.apache.org/viewvc/apr/apr/branches/1.4.x/strings/apr_fnmatch.c?r1=731029&r2=1098902
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.