Описание
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | DNE | |
| devel | not-affected | 1.4.6-1 |
| hardy | DNE | |
| jaunty | DNE | |
| karmic | DNE | |
| lucid | ignored | end of life |
| maverick | not-affected | 1.4.6-1 |
| natty | not-affected | 1.4.6-1 |
| oneiric | not-affected | 1.4.6-1 |
| precise | not-affected | 1.4.6-1 |
Показывать по
Ссылки на источники
7.5 High
CVSS2
Связанные уязвимости
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
The put command functionality in beanstalkd 1.4.5 and earlier allows r ...
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
7.5 High
CVSS2