Rapid7 Vulnerability & Exploit Database

RHSA-2011:0507: apr security update

Back to Search

RHSA-2011:0507: apr security update

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
05/16/2011
Created
07/25/2018
Added
05/19/2011
Modified
07/04/2017

Description

The Apache Portable Runtime (APR) is a portability library used by theApache HTTP Server and other projects. It provides a free library of C datastructures and routines.It was discovered that the apr_fnmatch() function used an unconstrainedrecursion when processing patterns with the '*' wildcard. An attacker coulduse this flaw to cause an application using this function, which alsoaccepted untrusted input as a pattern for matching (such as an httpd serverusing the mod_autoindex module), to exhaust all stack memory or use anexcessive amount of CPU time when performing matching. (CVE-2011-0419)Red Hat would like to thank Maksymilian Arciemowicz for reporting thisissue.All apr users should upgrade to these updated packages, which contain abackported patch to correct this issue. Applications using the apr library,such as httpd, must be restarted for this update to take effect.

Solution(s)

  • redhat-upgrade-apr
  • redhat-upgrade-apr-debuginfo
  • redhat-upgrade-apr-devel
  • redhat-upgrade-apr-docs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;