Mandriva Linux Security Advisory : apr (MDVSA-2011:084)

Medium Nessus Plugin ID 53908


The remote Mandriva Linux host is missing one or more security updates.


It was discovered that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching (CVE-2011-0419).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: products_id=490

The updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 53908

File Name: mandriva_MDVSA-2011-084.nasl

Version: $Revision: 1.12 $

Type: local

Published: 2011/05/16

Modified: 2014/05/20

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64apr-devel, p-cpe:/a:mandriva:linux:lib64apr1, p-cpe:/a:mandriva:linux:libapr-devel, p-cpe:/a:mandriva:linux:libapr1, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2010.0, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/05/13

Reference Information

CVE: CVE-2011-0419

BID: 47820

MDVSA: 2011:084