First published: Tue May 10 2011(Updated: )
Apache Portable Runtime (APR) is vulnerable to a denial of service, caused by an error in the apr_fnmatch() function when processing specific patterns with the "*" wildcard. A remote attacker could exploit this vulnerability to consume all available CPU and memory resources resulting in a denial of service.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Engineering Requirements Management DOORS Web Access | <=9.7.2.8 | |
IBM Rational DOORS Web Access | <=9.7.2.8 | |
IBM Rational DOORS | <=9.6.1.x | |
Apache Portable Runtime | <1.4.3 | |
Apache HTTP Server | >=2.0.0<=2.0.65 | |
Apache HTTP Server | >=2.2.0<=2.2.18 | |
Apple iOS and macOS | =10.6.0 | |
FreeBSD Kernel | ||
Android | ||
NetBSD current | =5.1 | |
OpenBSD | =4.8 | |
Oracle Solaris and Zettabyte File System (ZFS) | =10 | |
Debian | =5.0 | |
Debian | =6.0 | |
Debian | =7.0 | |
SUSE Linux Enterprise Server | =10-sp3 | |
Apache Portable Runtime | <=1.4.3 | |
Apache HTTP Server | >=2.0.35<=2.0.65 | |
Apache HTTP Server | >=2.2.0<2.2.19 |
http://svn.apache.org/viewvc/apr/apr/branches/1.4.x/strings/apr_fnmatch.c?r1=731029&r2=1098902
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0419 has a severity rating that indicates it can cause a denial of service due to high CPU and memory consumption.
To fix CVE-2011-0419, you should update the Apache Portable Runtime or the affected Apache HTTP Server to the latest version.
CVE-2011-0419 affects Apache Portable Runtime versions up to 1.4.3 and various versions of the Apache HTTP Server.
Yes, CVE-2011-0419 can be exploited remotely by an attacker through specially crafted patterns that utilize the "*" wildcard.
The impact of CVE-2011-0419 is a denial of service, which can lead to system instability or unresponsiveness.