FreeBSD Apache apr — multiple vulnerabilities

by on June 9, 2007 · 0 comments· LAST UPDATED June 9, 2009

in , ,

Some vulnerabilities have been reported in APR-util, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).

Affected package: apache-2.2.11_4

A vulnerability is caused due to an error in the processing of XML files and can be exploited to exhaust all available memory via a specially crafted XML file containing a predefined entity inside an entity definition. A vulnerability is caused due to an error within the "apr_strmatch_precompile()" function in strmatch/apr_strmatch.c, which can be exploited to crash an application using the library. A single NULL byte buffer overflow flaw was found in apr-util's apr_brigade_vprintf() function.
To Fix this issue use the following commands, it will upgrade apache and other software too:
# portsnap fetch update
# pkg_version -l '<'
# portmaster -a

TwitterFacebookGoogle+PDF versionFound an error/typo on this page? Help us!

{ 0 comments… add one now }

Leave a Comment

Tagged as: , , , , , , , , , , , , , , , , ,

Previous post:

Next post: