| Severity : |
Medium
|
| Published : |
2011-05-16
|
| Modified : |
2013-10-10
|
| Base Score : |
4.3
|
| Details : |
Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
|
| Product/Version : |
Pro 5.0
CGE 5.x
Mobilinux 5.x
Mobilinux 5.0.24
MVL 5 Atom
Pro 5.0.24
MVL 5 OMAP3
MVL 5 OMAP3530
Carrier Grade CGE 6.0
|
|