FreeBSD : Apache APR -- DoS vulnerabilities (00b296b6-7db1-11e0-96b7-00300582f9fc)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The Apache Portable Runtime Project reports :

Note especially a security fix to APR 1.4.4, excessive CPU consumption
was possible due to an unconstrained, recursive invocation of
apr_fnmatch, as apr_fnmatch processed '*' wildcards. Reimplement
apr_fnmatch() from scratch using a non-recursive algorithm now has
improved compliance with the fnmatch() spec. (William Rowe)

See also :

http://www.apache.org/dist/apr/Announcement1.x.html
http://www.nessus.org/u?f79cd8a1

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 53905 ()

Bugtraq ID:

CVE ID: CVE-2011-0419

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now