CVE-2011-0419 (CNNVD-201105-160)
中文标题:
Apache Portable Runtime和HTTP Server 'fnmatch()'栈消耗漏洞
英文标题:
Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portabl...
漏洞描述
中文描述:
APR(Apache portable Run-time libraries,Apache可移植运行库)的目的如其名称一样,主要为上层的应用程序提供一个可以跨越多操作系统平台使用的底层支持接口库。NetBSD是NetBSD基金会开发的一套免费开源的类Unix操作系统。 Apache Portable Runtime (APR)库1.4.3之前版本,Apache HTTP Server 2.2.18之前版本的apr_fnmatch.c中存在栈消耗漏洞。该漏洞是由于“fnmatch()”函数的实现没有正确限制它的递归调用,远程攻击者可以借助first参数中的*?序列导致拒绝服务(CPU和内存消耗)。
英文描述:
Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| apache | portable_runtime | * | - | - |
cpe:2.3:a:apache:portable_runtime:*:*:*:*:*:*:*:*
|
| apache | http_server | * | - | - |
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.6.0 | - | - |
cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
|
| freebsd | freebsd | * | - | - |
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
|
| android | * | - | - |
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
|
|
| netbsd | netbsd | 5.1 | - | - |
cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
|
| openbsd | openbsd | 4.8 | - | - |
cpe:2.3:o:openbsd:openbsd:4.8:*:*:*:*:*:*:*
|
| oracle | solaris | 10 | - | - |
cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
|
| debian | debian_linux | 5.0 | - | - |
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 6.0 | - | - |
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 7.0 | - | - |
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 10 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
AV:N/AC:M/Au:N/C:N/I:N/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2011-0419 |
2025-11-11 15:18:20 | 2025-11-11 07:33:13 |
| NVD | nvd_CVE-2011-0419 |
2025-11-11 14:53:42 | 2025-11-11 07:42:02 |
| CNNVD | cnnvd_CNNVD-201105-160 |
2025-11-11 15:09:12 | 2025-11-11 07:49:50 |
| EXPLOITDB | exploitdb_EDB-35738 |
2025-11-11 15:05:24 | 2025-11-11 08:32:01 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 58 -> 61
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-201105-160
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 4.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:N/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 12
- references_count: 62 -> 58
- data_sources: ['cve'] -> ['cve', 'nvd']