Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-3843

Опубликовано: 13 июн. 2014
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8

Описание

Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needs-triage
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

1.2.1
utopic

DNE

Показывать по

6.8 Medium

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.

debian
больше 11 лет назад

Stack-based buffer overflow in the mk_request_header_process function ...

github
больше 3 лет назад

Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.

6.8 Medium

CVSS2