CVE-2011-1928
Published: 24 May 2011
The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
From the Ubuntu Security Team
Is was discovered that the fix for CVE-2011-0419 introduced a different flaw in the fnmatch() implementation that could also result in a denial of service. (CVE-2011-1928)
Priority
Status
Package | Release | Status |
---|---|---|
apache2 Launchpad, Ubuntu, Debian |
dapper |
Released
(2.0.55-4ubuntu2.13)
|
hardy |
Not vulnerable
(uses system apr)
|
|
lucid |
Not vulnerable
(uses system apr)
|
|
maverick |
Not vulnerable
(uses system apr)
|
|
natty |
Not vulnerable
(uses system apr)
|
|
upstream |
Pending
|
|
apr Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Released
(1.2.11-1ubuntu0.2)
|
|
lucid |
Released
(1.3.8-1ubuntu0.3)
|
|
maverick |
Released
(1.4.2-3ubuntu1.1)
|
|
natty |
Released
(1.4.2-7ubuntu2.1)
|
|
upstream |
Released
(1.4.5-1)
|