CVE-2010-4098

monotone before 0.48.1, when configured to allow remote commands, allows remote attackers to cause a denial of service (crash) via an empty argument to the mtn command.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:monotone:monotone:*:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:-:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.1:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.2:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.3:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.4:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.5:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.6:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.7:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.8:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.9:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.10:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.11:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.12:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.13:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.14:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.15:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.16:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.17:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.18:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.19:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.20:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.21:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.22:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.23:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.24:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.25:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.26:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.27:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.28:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.29:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.30:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.31:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.32:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.33:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.34:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.35:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.36:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.37:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.38:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.39:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.40:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.41:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.42:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.43:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.44:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.45:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.46:*:*:*:*:*:*:*
cpe:2.3:a:monotone:monotone:0.47:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050468.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050468.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050484.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050484.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html -
References () http://secunia.com/advisories/41960 - Vendor Advisory () http://secunia.com/advisories/41960 - Vendor Advisory
References () http://secunia.com/advisories/42177 - () http://secunia.com/advisories/42177 -
References () http://www.monotone.ca/NEWS - () http://www.monotone.ca/NEWS -
References () http://www.securityfocus.com/bid/44383 - () http://www.securityfocus.com/bid/44383 -
References () http://www.vupen.com/english/advisories/2010/2910 - () http://www.vupen.com/english/advisories/2010/2910 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/62758 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/62758 -

Information

Published : 2010-10-27 19:00

Updated : 2025-04-11 00:51


NVD link : CVE-2010-4098

Mitre link : CVE-2010-4098

CVE.ORG link : CVE-2010-4098


JSON object : View

Products Affected

monotone

  • monotone