Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-2060

Опубликовано: 08 июн. 2010
Источник: debian
EPSS Низкий

Описание

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
beanstalkdfixed1.4.6-1package

Примечания

  • Package description reads: "Beanstalkd is meant to be ran in a trusted network,

  • "as it has no authorisation/authentication mechanisms". So this is likely a non-issue

EPSS

Процентиль: 76%
0.01003
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

redhat
больше 15 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

nvd
больше 15 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

github
больше 3 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

EPSS

Процентиль: 76%
0.01003
Низкий