Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9564

Опубликовано: 30 нояб. 2016
Источник: debian

Описание

Buffer overflow in send_redirect() in Boa Webserver 0.92r allows remote attackers to DoS via an HTTP GET request requesting a long URI with only '/' and '.' characters.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
boanot-affectedpackage

Примечания

  • http://www.ljcusack.io/cve-2016-9564-stack-based-buffer-overflow-in-boa-0-dot-92r

Связанные уязвимости

CVSS3: 7.5
nvd
около 9 лет назад

Buffer overflow in send_redirect() in Boa Webserver 0.92r allows remote attackers to DoS via an HTTP GET request requesting a long URI with only '/' and '.' characters.

CVSS3: 7.5
github
больше 3 лет назад

Buffer overflow in send_redirect() in Boa Webserver 0.92r allows remote attackers to DoS via an HTTP GET request requesting a long URI with only '/' and '.' characters.