CVE-2016-9564

Buffer overflow in send_redirect() in Boa Webserver 0.92r allows remote attackers to DoS via an HTTP GET request requesting a long URI with only '/' and '.' characters.
Configurations

Configuration 1 (hide)

cpe:2.3:a:boa:boa:0.92r:*:*:*:*:*:*:*

History

21 Nov 2024, 03:01

Type Values Removed Values Added
References () http://www.ljcusack.io/cve-2016-9564-stack-based-buffer-overflow-in-boa-0-dot-92r - Exploit, Technical Description, URL Repurposed () http://www.ljcusack.io/cve-2016-9564-stack-based-buffer-overflow-in-boa-0-dot-92r - Exploit, Technical Description, URL Repurposed
References () http://www.securityfocus.com/bid/94599 - () http://www.securityfocus.com/bid/94599 -

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://www.ljcusack.io/cve-2016-9564-stack-based-buffer-overflow-in-boa-0-dot-92r - Exploit, Technical Description (MISC) http://www.ljcusack.io/cve-2016-9564-stack-based-buffer-overflow-in-boa-0-dot-92r - Exploit, Technical Description, URL Repurposed

Information

Published : 2016-11-30 11:59

Updated : 2024-11-21 03:01


NVD link : CVE-2016-9564

Mitre link : CVE-2016-9564

CVE.ORG link : CVE-2016-9564


JSON object : View

Products Affected

boa

  • boa
CWE
CWE-20

Improper Input Validation