FreeBSD : Apache APR -- DoS vulnerabilities (00b296b6-7db1-11e0-96b7-00300582f9fc)

Medium Nessus Plugin ID 53905


The remote FreeBSD host is missing a security-related update.


The Apache Portable Runtime Project reports :

Note especially a security fix to APR 1.4.4, excessive CPU consumption was possible due to an unconstrained, recursive invocation of apr_fnmatch, as apr_fnmatch processed '*' wildcards. Reimplement apr_fnmatch() from scratch using a non-recursive algorithm now has improved compliance with the fnmatch() spec. (William Rowe)


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 53905

File Name: freebsd_pkg_00b296b67db111e096b700300582f9fc.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2011/05/16

Modified: 2013/07/20

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apr1, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2011/05/12

Vulnerability Publication Date: 2011/05/10

Reference Information

CVE: CVE-2011-0419