FreeBSD : Apache APR -- DoS vulnerabilities (00b296b6-7db1-11e0-96b7-00300582f9fc)

medium Nessus Plugin ID 53905

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The Apache Portable Runtime Project reports :

Note especially a security fix to APR 1.4.4, excessive CPU consumption was possible due to an unconstrained, recursive invocation of apr_fnmatch, as apr_fnmatch processed '*' wildcards. Reimplement apr_fnmatch() from scratch using a non-recursive algorithm now has improved compliance with the fnmatch() spec. (William Rowe)

Solution

Update the affected package.

See Also

http://www.apache.org/dist/apr/Announcement1.x.html

http://www.nessus.org/u?ce7660e9

Plugin Details

Severity: Medium

ID: 53905

File Name: freebsd_pkg_00b296b67db111e096b700300582f9fc.nasl

Version: 1.13

Type: local

Published: 5/16/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apr1, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 5/12/2011

Vulnerability Publication Date: 5/10/2011

Reference Information

CVE: CVE-2011-0419