VID |
22521 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the version of Apache 2.2 installed on the remote host is older than 2.2.18. Such versions are affected by a denial of service vulnerability due to an error in the 'apr_fnmatch' match function of the bundled APR library.
If mod_autoindex is enabled and has indexed a directory containing files whose filenames are long, an attacker can cause high CPU usage with a specially crafted request.
Note that the remote web server may not actually be affected by this vulnerability.
* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.apache.org/dist/httpd/CHANGES_2.2.18 http://httpd.apache.org/security/vulnerabilities_22.html#2.2.18 http://securityreason.com/achievement_securityalert/98
* Platforms Affected: Apache HTTP versions 2.2 prior to 2.2.18 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache HTTP Server (2.2.18 or later), available from the Apache Software Foundation download site, http://httpd.apache.org/download.cgi -- OR -- As a workaround, ensure that the affected modules are not in use. |
Related URL |
CVE-2011-0419 (CVE) |
Related URL |
47820 (SecurityFocus) |
Related URL |
(ISS) |
|