The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d - | |
References | () http://kr.github.com/beanstalkd/2010/05/23/1.4.6-release-notes.html - | |
References | () http://osvdb.org/65113 - | |
References | () http://secunia.com/advisories/40032 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/40516 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/59107 - |
Information
Published : 2010-06-08 00:30
Updated : 2024-11-21 01:15
NVD link : CVE-2010-2060
Mitre link : CVE-2010-2060
CVE.ORG link : CVE-2010-2060
JSON object : View
Products Affected
wildbit
- beanstalkd
CWE