Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library prior to 1.4.3 and the Apache HTTP Server prior to 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent malicious users to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache portable runtime |
||
apache http server |
||
netbsd netbsd 5.1 |
||
google android |
||
freebsd freebsd |
||
openbsd openbsd 4.8 |
||
apple mac os x 10.6.0 |
||
oracle solaris 10 |
||
debian debian linux 5.0 |
||
debian debian linux 7.0 |
||
debian debian linux 6.0 |
||
suse linux enterprise server 10 |