Multiple stack-based buffer overflows in Tembria Server Monitor before 5.6.1 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted (1) GET, (2) PUT, or (3) HEAD request, as demonstrated by a malformed GET request containing a long PATH_INFO to index.asp.
References
Configurations
History
21 Nov 2024, 01:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/39270 - Vendor Advisory | |
References | () http://www.corelan.be:8800/advisories.php?id=CORELAN-10-022 - | |
References | () http://www.corelan.be:8800/wp-content/forum-file-uploads/admin1/exploits/corelan_lincoln_tembria.py_.txt - |
Information
Published : 2010-04-14 16:00
Updated : 2024-11-21 01:14
NVD link : CVE-2010-1316
Mitre link : CVE-2010-1316
CVE.ORG link : CVE-2010-1316
JSON object : View
Products Affected
tembria
- server_monitor
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer