Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-7039

Опубликовано: 28 нояб. 2013
Источник: redhat
CVSS2: 5.1
EPSS Низкий

Описание

Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7libmicrohttpdNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1039390libmicrohttpd: stack overflow in MHD_digest_auth_check()

EPSS

Процентиль: 85%
0.02385
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
около 12 лет назад

Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header.

nvd
около 12 лет назад

Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header.

debian
около 12 лет назад

Stack-based buffer overflow in the MHD_digest_auth_check function in l ...

github
больше 3 лет назад

Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header.

suse-cvrf
больше 8 лет назад

Security update for libmicrohttpd

EPSS

Процентиль: 85%
0.02385
Низкий

5.1 Medium

CVSS2