Информационная безопасность
[RU] switch to English


DoS против библиотеки apr / Apache mod_autoindex
дополнено с 16 мая 2011 г.
Опубликовано:21 мая 2011 г.
Источник:
SecurityVulns ID:11676
Тип:удаленная
Уровень опасности:
5/10
Описание:Исчерпание ресурсов процессора на длинных именах.
Затронутые продукты:APACHE : apr 1.4
CVE:CVE-2011-1928 (The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.)
 CVE-2011-0419 (Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.)
Оригинальный текстdocumentMANDRIVA, [ MDVSA-2011:095 ] apr (21.05.2011)
 documentMaksymilian Arciemowicz, Multiple Vendors libc/fnmatch(3) DoS (incl apache poc) (16.05.2011)
 documentDEBIAN, [SECURITY] [DSA 2237-1] apr security update (16.05.2011)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород