5
CVSSv2

CVE-2012-0840

Published: 10/02/2012 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

tables/apr_hash.c in the Apache Portable Runtime (APR) library up to and including 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache portable runtime 1.3.6-dev

apache portable runtime 1.3.7

apache portable runtime 0.9.7-dev

apache portable runtime 1.3.3

apache portable runtime 0.9.6

apache portable runtime 0.9.16-dev

apache portable runtime 0.9.8

apache portable runtime 1.3.1

apache portable runtime 1.3.2

apache portable runtime 1.3.9

apache portable runtime 1.3.4

apache portable runtime 1.3.10

apache portable runtime 0.9.4

apache portable runtime 1.4.3

apache portable runtime 1.4.4

apache portable runtime 1.4.1

apache portable runtime 0.9.3

apache portable runtime 0.9.1

apache portable runtime

apache portable runtime 0.9.5

apache portable runtime 1.3.8

apache portable runtime 1.4.0

apache portable runtime 1.3.13

apache portable runtime 1.3.11

apache portable runtime 0.9.7

apache portable runtime 0.9.2-dev

apache portable runtime 0.9.2

apache portable runtime 1.3.6

apache portable runtime 1.3.12

apache portable runtime 1.4.2

apache portable runtime 0.9.9

apache portable runtime 1.3.5

apache portable runtime 0.9.3-dev

apache portable runtime 1.3.4-dev

apache portable runtime 1.3.0

Vendor Advisories

Debian Bug report logs - #655435 libapr1: apr_hash vulnerable to oCert-2011-003 style DOS attacks Package: libapr1; Maintainer for libapr1 is Debian Apache Maintainers <debian-apache@listsdebianorg>; Source for libapr1 is src:apr (PTS, buildd, popcon) Reported by: John Lightsey <lightsey@debianorg> Date: Wed, 11 J ...

Exploits

source: wwwsecurityfocuscom/bid/51917/info Apache APR is prone to a denial-of-service vulnerability An attacker can exploit this issue by sending specially crafted forms in HTTP POST requests githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36669zip ...