4.3
CVSSv2

CVE-2011-1928

Published: 24/05/2011 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote malicious users to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache apr-util 1.4.3

apache http server 2.2.18

apache apr-util 1.4.4

Vendor Advisories

Debian Bug report logs - #627182 libapr1: last security update introduces a infinite loop condition Package: libapr1; Maintainer for libapr1 is Debian Apache Maintainers <debian-apache@listsdebianorg>; Source for libapr1 is src:apr (PTS, buildd, popcon) Reported by: Tanguy Ortolo <tanguy+debian@ortoloeu> Date: Wed ...
A denial of service issue exists that affects the Apache web server ...

Github Repositories

Entity Extraction Using Syntaxnet Entity Extraction is a subtask of information extraction that seeks to locate and classify named entities in text into pre-defined categories such as the names of persons, organizations, locations, expressions of times, quantities, monetary values, percentages, etc NLP libraries like Spacy and NLTK are used for this purpose The drawback is th

Entity Extraction Using Syntaxnet Entity Extraction is a subtask of information extraction that seeks to locate and classify named entities in text into pre-defined categories such as the names of persons, organizations, locations, expressions of times, quantities, monetary values, percentages, etc NLP libraries like Spacy and NLTK are used for this purpose The drawback is th