| Summary | The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. |
|---|---|
| Publication Date | Nov. 8, 2011, 8:55 p.m. |
| Registration Date | Jan. 28, 2021, 4:39 p.m. |
| Last Update | Nov. 21, 2024, 10:32 a.m. |
| CVSS2.0 : LOW | |
| Score | 1.2 |
|---|---|
| Vector | AV:L/AC:H/Au:N/C:N/I:N/A:P |
| 攻撃元区分(AV) | ローカル |
| 攻撃条件の複雑さ(AC) | 高 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* | |||||
| Title | Apache HTTP Server におけるサービス運用妨害 (DoS) の脆弱性 |
|---|---|
| Summary | Apache HTTP Server の server/util.c 内にある ap_pregsub 関数は、mod_setenvif モジュールが有効な際、環境変数の値のサイズを制限しないため、サービス運用妨害 (メモリ消費、または NULL ポインタデリファレンス) 状態となる脆弱性が存在します。 本脆弱性は、CVE-2011-3607 の脆弱性とは異なる脆弱性です。 |
| Possible impacts | ローカルユーザにより、(1) "len +=" ステートメントおよび (2) apr_pcalloc 関数呼び出しに関連した、巧妙に細工された HTTP リクエストヘッダーとともに、巧妙に細工された SetEnvIf ディレクティブを伴う .htaccess ファイルを介して、サービス運用妨害 (メモリ消費、または NULL ポインタデリファレンス) 状態となる可能性があります。 |
| Solution | ベンダ情報及び参考情報を参照して適切な対策を実施してください。 |
| Publication Date | Nov. 8, 2011, midnight |
| Registration Date | Nov. 11, 2011, 11:20 a.m. |
| Last Update | June 8, 2012, 10:37 a.m. |
| Apache Software Foundation |
| Apache HTTP Server 2.0.x から 2.0.64 |
| Apache HTTP Server 2.2.x から 2.2.21 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2011年11月11日] 掲載 [2012年06月08日] CVSS による深刻度:基本値および可用性への影響を変更 |
Feb. 17, 2018, 10:37 a.m. |