English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75803 CVE descriptions
and 40037 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2011-0419
Description:Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
Test IDs: 1.3.6.1.4.1.25623.1.0.69676   1.3.6.1.4.1.25623.1.0.69734   1.3.6.1.4.1.25623.1.0.69660   1.3.6.1.4.1.25623.1.0.69644   1.3.6.1.4.1.25623.1.0.69767   1.3.6.1.4.1.25623.1.0.69670   1.3.6.1.4.1.25623.1.0.69762   1.3.6.1.4.1.25623.1.0.69774   1.3.6.1.4.1.25623.1.0.69831   1.3.6.1.4.1.25623.1.0.69843   1.3.6.1.4.1.25623.1.0.69841   1.3.6.1.4.1.25623.1.0.69784   1.3.6.1.4.1.25623.1.0.70602   1.3.6.1.4.1.25623.1.0.70847   1.3.6.1.4.1.25623.1.0.802337   1.3.6.1.4.1.25623.1.0.71948  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2011-0419
http://securityreason.com/achievement_securityalert/98
http://www.mail-archive.com/dev@apr.apache.org/msg23961.html
http://www.mail-archive.com/dev@apr.apache.org/msg23960.html
http://www.mail-archive.com/dev@apr.apache.org/msg23976.html
http://cxib.net/stuff/apache.fnmatch.phps
http://cxib.net/stuff/apr_fnmatch.txts
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
Debian Security Information: DSA-2237 (Google Search)
http://www.debian.org/security/2011/dsa-2237
HPdes Security Advisory: HPSBUX02702
http://marc.info/?l=bugtraq&m=131551295528105&w=2
HPdes Security Advisory: HPSBUX02707
http://marc.info/?l=bugtraq&m=131731002122529&w=2
HPdes Security Advisory: SSRT100606
http://marc.info/?l=bugtraq&m=131551295528105&w=2
HPdes Security Advisory: SSRT100626
http://marc.info/?l=bugtraq&m=131731002122529&w=2
HPdes Security Advisory: HPSBMU02704
http://marc.info/?l=bugtraq&m=132033751509019&w=2
HPdes Security Advisory: HPSBOV02822
http://marc.info/?l=bugtraq&m=134987041210674&w=2
HPdes Security Advisory: SSRT100966
http://marc.info/?l=bugtraq&m=134987041210674&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2011:084
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
RedHat Security Advisories: RHSA-2011:0507
http://www.redhat.com/support/errata/RHSA-2011-0507.html
RedHat Security Advisories: RHSA-2011:0896
http://www.redhat.com/support/errata/RHSA-2011-0896.html
RedHat Security Advisories: RHSA-2011:0897
http://www.redhat.com/support/errata/RHSA-2011-0897.html
SuSE Security Announcement: SUSE-SU-2011:1229 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14638
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14804
http://securitytracker.com/id?1025527
http://secunia.com/advisories/44490
http://secunia.com/advisories/44564
http://secunia.com/advisories/44574
http://securityreason.com/securityalert/8246

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.