#VU33122 Input validation error - CVE-2012-0840
Published: February 10, 2012 / Updated: August 4, 2020
Description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Remediation
External links
- http://mail-archives.apache.org/mod_mbox/apr-commits/201201.mbox/%3C20120115003715.071D423888FD@eris.apache.org%3E
- http://openwall.com/lists/oss-security/2012/02/08/3
- http://openwall.com/lists/oss-security/2012/02/09/1
- http://secunia.com/advisories/47862
- http://svn.apache.org/viewvc?rev=1231605&view=rev
- http://www.mail-archive.com/dev%40apr.apache.org/msg24439.html
- http://www.mail-archive.com/dev%40apr.apache.org/msg24472.html
- http://www.mail-archive.com/dev%40apr.apache.org/msg24473.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:019
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73096