CVE-2011-4415 (CNNVD-201111-182)
中文标题:
Apache HTTP Server ‘server/util.c’ 输入验证漏洞
英文标题:
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x th...
漏洞描述
中文描述:
Apache HTTP Server是美国阿帕奇(Apache)软件基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 2.0.x版本至2.0.64版本以及2.2.x版本至2.2.21版本中存在漏洞。由于server/util.c的ap_pregsub函数在启用mod_setenvif模块时不能限制环境变量值的大小,本地用户可通过带有特制SetEnvIf指示符的.htaccess文件导致拒绝服务(内存消耗或者空指针解引用)。
英文描述:
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| apache | http_server | 2.0 | - | - |
cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.9 | - | - |
cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.28 | - | - |
cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.32 | - | - |
cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.34 | - | - |
cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*
|
| apache | http_server | 2.0.35 | - | - |
cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.36 | - | - |
cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.37 | - | - |
cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.38 | - | - |
cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.39 | - | - |
cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.40 | - | - |
cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.41 | - | - |
cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.42 | - | - |
cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.43 | - | - |
cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.44 | - | - |
cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.45 | - | - |
cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.46 | - | - |
cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.47 | - | - |
cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.48 | - | - |
cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.49 | - | - |
cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.50 | - | - |
cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.51 | - | - |
cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.52 | - | - |
cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.53 | - | - |
cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.54 | - | - |
cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.55 | - | - |
cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.56 | - | - |
cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.57 | - | - |
cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.58 | - | - |
cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.59 | - | - |
cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.60 | - | - |
cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.61 | - | - |
cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.63 | - | - |
cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.64 | - | - |
cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.0 | - | - |
cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.1 | - | - |
cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.2 | - | - |
cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.3 | - | - |
cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.4 | - | - |
cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.6 | - | - |
cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.8 | - | - |
cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.9 | - | - |
cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.10 | - | - |
cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.11 | - | - |
cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.12 | - | - |
cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.13 | - | - |
cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.14 | - | - |
cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.15 | - | - |
cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.16 | - | - |
cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.18 | - | - |
cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.19 | - | - |
cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.20 | - | - |
cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.21 | - | - |
cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
cve.org
CVSS评分详情
AV:L/AC:H/Au:N/C:N/I:N/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2011-4415 |
2025-11-11 15:18:25 | 2025-11-11 07:33:18 |
| NVD | nvd_CVE-2011-4415 |
2025-11-11 14:53:44 | 2025-11-11 07:42:08 |
| CNNVD | cnnvd_CNNVD-201111-182 |
2025-11-11 15:09:14 | 2025-11-11 07:49:57 |
| EXPLOITDB | exploitdb_EDB-41769 |
2025-11-11 15:05:24 | 2025-11-11 08:43:19 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 4 -> 8
- tags_count: 0 -> 3
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201111-182
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.LOW
- cvss_score: 未提取 -> 1.2
- cvss_vector: NOT_EXTRACTED -> AV:L/AC:H/Au:N/C:N/I:N/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 53
- references_count: 5 -> 4
- data_sources: ['cve'] -> ['cve', 'nvd']