Debian APR Library Security Update.
APR packages: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0
A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex.
A directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage.
This could be used in a denial of service attack.
For the oldstable distribution (lenny), this problem has been fixed in version 1.2.12-5+lenny4.
For the stable distribution (squeeze), this problem has been fixed in version 1.4.2-6+squeeze2.
For the testing distribution (wheezy), this problem will be fixed in version 1.4.5-1.
For the unstable distribution (sid), this problem will be fixed in version 1.4.5-1.
Recommend that upgrade the APR packages and restart the apache2 server. Successful exploitation requires that "mod_autoindex" is enabled.