Описание
Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.4.2-5ubuntu3.1 |
edgy | released | 1.4.3.0cvs.20060707-3ubuntu0.1 |
feisty | released | 1.4.5-2ubuntu0.1 |
gutsy | released | 1.4.8-2.1ubuntu1.1 |
upstream | released | 1.4.11 |
Показывать по
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
Buffer overflow in the redir function in check_http.c in Nagios Plugin ...
Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
EPSS
6.8 Medium
CVSS2