FreeBSD : Apache APR -- DoS vulnerabilities (00b296b6-7db1-11e0-96b7-00300582f9fc)

Medium Nessus Plugin ID 53905

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The Apache Portable Runtime Project reports :

Note especially a security fix to APR 1.4.4, excessive CPU consumption was possible due to an unconstrained, recursive invocation of apr_fnmatch, as apr_fnmatch processed '*' wildcards. Reimplement apr_fnmatch() from scratch using a non-recursive algorithm now has improved compliance with the fnmatch() spec. (William Rowe)

Solution

Update the affected package.

See Also

http://www.apache.org/dist/apr/Announcement1.x.html

http://www.nessus.org/u?ce7660e9

Plugin Details

Severity: Medium

ID: 53905

File Name: freebsd_pkg_00b296b67db111e096b700300582f9fc.nasl

Version: 1.12

Type: local

Published: 2011/05/16

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apr1, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2011/05/12

Vulnerability Publication Date: 2011/05/10

Reference Information

CVE: CVE-2011-0419