Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-0419

EPSS 48.78% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2011-0419

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Portable Runtime和HTTP Server 'fnmatch()'栈消耗漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
APR(Apache portable Run-time libraries,Apache可移植运行库)的目的如其名称一样,主要为上层的应用程序提供一个可以跨越多操作系统平台使用的底层支持接口库。NetBSD是NetBSD基金会开发的一套免费开源的类Unix操作系统。 Apache Portable Runtime (APR)库1.4.3之前版本,Apache HTTP Server 2.2.18之前版本的apr_fnmatch.c中存在栈消耗漏洞。该漏洞是由于“fnmatch()”函数的实现没有正确限制
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2011-0419

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2011-0419

Please Login to view more intelligence information

Same Patch Batch · n/a · 2011-05-16 · 15 CVEs total

CVE-2011-1407Exim DKIM实现远程代码执行漏洞
CVE-2011-1828USB Creator usb-creator-helper权限提升漏洞
CVE-2011-1856HP Business Availability Center跨站脚本攻击漏洞
CVE-2011-2141IBM Datacap Taskmaster Capture TMWeb SQL注入漏洞
CVE-2011-2142IBM Datacap Taskmaster Capture Web Client Service加密问题漏洞
CVE-2011-2143IBM Datacap Taskmaster Capture权限许可和访问控制漏洞
CVE-2011-2144IBM Datacap Taskmaster Capture eDocument Conversion Actions实现拒绝服务漏洞
CVE-2011-0612Adobe Flash Media Server XML数据破坏漏洞
CVE-2011-0613Adobe RoboHelp多个跨站脚本攻击漏洞
CVE-2011-0614Adobe Audition SES会话文件处理缓冲区溢出漏洞
CVE-2011-0615Adobe Audition SES会话文件TRKM块解析多个缓冲区溢出漏洞
CVE-2011-1799Google Chrome输入验证错误漏洞
CVE-2011-1800Google Chrome输入验证错误漏洞
CVE-2011-1899CA eHealth多个跨站脚本攻击漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2011-0419

No comments yet


Leave a comment