Buffer overflow in send_redirect() in Boa Webserver 0.92r allows remote attackers to DoS via an HTTP GET request requesting a long URI with only '/' and '.' characters.
References
Link | Resource |
---|---|
http://www.ljcusack.io/cve-2016-9564-stack-based-buffer-overflow-in-boa-0-dot-92r | Exploit Technical Description URL Repurposed |
http://www.securityfocus.com/bid/94599 | |
http://www.ljcusack.io/cve-2016-9564-stack-based-buffer-overflow-in-boa-0-dot-92r | Exploit Technical Description URL Repurposed |
http://www.securityfocus.com/bid/94599 |
Configurations
History
21 Nov 2024, 03:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ljcusack.io/cve-2016-9564-stack-based-buffer-overflow-in-boa-0-dot-92r - Exploit, Technical Description, URL Repurposed | |
References | () http://www.securityfocus.com/bid/94599 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://www.ljcusack.io/cve-2016-9564-stack-based-buffer-overflow-in-boa-0-dot-92r - Exploit, Technical Description, URL Repurposed |
Information
Published : 2016-11-30 11:59
Updated : 2024-11-21 03:01
NVD link : CVE-2016-9564
Mitre link : CVE-2016-9564
CVE.ORG link : CVE-2016-9564
JSON object : View
Products Affected
boa
- boa
CWE
CWE-20
Improper Input Validation