Vulnerability CVE-2010-1316


Published: 2010-04-14   Modified: 2012-02-13

Description:
Multiple stack-based buffer overflows in Tembria Server Monitor before 5.6.1 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted (1) GET, (2) PUT, or (3) HEAD request, as demonstrated by a malformed GET request containing a long PATH_INFO to index.asp.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
tembria server_monitor 5.6.0 buffer overflow
null
18.04.2010

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Tembria -> Server monitor 

 References:
http://www.corelan.be:8800/wp-content/forum-file-uploads/admin1/exploits/corelan_lincoln_tembria.py_.txt
http://www.corelan.be:8800/advisories.php?id=CORELAN-10-022
http://secunia.com/advisories/39270

Copyright 2024, cxsecurity.com

 

Back to Top