MiniShare 1.3.2 allows remote attackers to cause a denial of service (crash) via a malformed HTTP GET or HEAD request without the proper number of trailing CRLF sequences.
References
Link | Resource |
---|---|
http://lists.netsys.com/pipermail/full-disclosure/2004-May/021980.html | |
http://marc.info/?l=bugtraq&m=108563992129877&w=2 | |
http://secunia.com/advisories/11715 | Exploit Patch Vendor Advisory |
http://sourceforge.net/project/shownotes.php?release_id=241158 | Patch Vendor Advisory |
http://www.autistici.org/fdonato/advisory/MiniShare1.3.2-adv.txt | Exploit Vendor Advisory |
http://www.osvdb.org/6432 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/10417 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16260 |
Configurations
History
No history.
Information
Published : 2004-05-26 04:00
Updated : 2024-02-28 10:24
NVD link : CVE-2004-2035
Mitre link : CVE-2004-2035
CVE.ORG link : CVE-2004-2035
JSON object : View
Products Affected
minishare
- minimal_http_server
CWE