CVE-2009-5028

Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:namazu:namazu:*:*:*:*:*:*:*:*
cpe:2.3:a:namazu:namazu:2.0:*:*:*:*:*:*:*
cpe:2.3:a:namazu:namazu:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:namazu:namazu:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:namazu:namazu:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:namazu:namazu:2.0.14:*:*:*:*:*:*:*
cpe:2.3:a:namazu:namazu:2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:namazu:namazu:2.0.16:*:*:*:*:*:*:*
cpe:2.3:a:namazu:namazu:2.0.17:*:*:*:*:*:*:*
cpe:2.3:a:namazu:namazu:2.0.18:*:*:*:*:*:*:*

History

No history.

Information

Published : 2011-11-30 04:05

Updated : 2024-02-04 17:54


NVD link : CVE-2009-5028

Mitre link : CVE-2009-5028

CVE.ORG link : CVE-2009-5028


JSON object : View

Products Affected

namazu

  • namazu
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer