CVE-2014-4158

Stack-based buffer overflow in Kolibri 2.0 allows remote attackers to execute arbitrary code via a long URI in a GET request.
Configurations

Configuration 1 (hide)

cpe:2.3:a:senkas:kolibri:2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:09

Type Values Removed Values Added
References () http://osvdb.org/show/osvdb/108090 - () http://osvdb.org/show/osvdb/108090 -
References () http://osvdb.org/show/osvdb/70808 - () http://osvdb.org/show/osvdb/70808 -
References () http://packetstormsecurity.com/files/126332/Kolibri-2.0-Stack-Buffer-Overflow.html - Exploit () http://packetstormsecurity.com/files/126332/Kolibri-2.0-Stack-Buffer-Overflow.html - Exploit
References () http://www.exploit-db.com/exploits/33027 - Exploit () http://www.exploit-db.com/exploits/33027 - Exploit
References () http://www.exploit-db.com/exploits/34059 - () http://www.exploit-db.com/exploits/34059 -
References () http://www.securityfocus.com/bid/68195 - Exploit () http://www.securityfocus.com/bid/68195 - Exploit

Information

Published : 2014-06-13 14:55

Updated : 2024-11-21 02:09


NVD link : CVE-2014-4158

Mitre link : CVE-2014-4158

CVE.ORG link : CVE-2014-4158


JSON object : View

Products Affected

senkas

  • kolibri
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer