CVE-2011-4415
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
08/11/2011
Last modified:
11/04/2025
Description
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607.
Impact
Base Score 2.0
1.20
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- http://www.gossamer-threads.com/lists/apache/dev/403775
- http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/
- http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- http://www.gossamer-threads.com/lists/apache/dev/403775
- http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/
- http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html



