First published: Tue Oct 01 2013(Updated: )
MongoDB before 2.0.9 and 2.2.x before 2.2.4 does not properly validate requests to the nativeHelper function in SpiderMonkey, which allows remote authenticated users to cause a denial of service (invalid memory access and server crash) or execute arbitrary code via a crafted memory address in the first argument.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
MongoDB | <=2.0.8 | |
MongoDB | =1.2.0 | |
MongoDB | =1.4.0 | |
MongoDB | =1.6.0 | |
MongoDB | =1.8.0 | |
MongoDB | =2.0.0 | |
MongoDB | =2.0.1 | |
MongoDB | =2.0.2 | |
MongoDB | =2.0.3 | |
MongoDB | =2.0.4 | |
MongoDB | =2.0.5 | |
MongoDB | =2.0.6 | |
MongoDB | =2.0.7 | |
MongoDB | =2.2.0 | |
MongoDB | =2.2.1 | |
MongoDB | =2.2.2 | |
MongoDB | =2.2.3 | |
Red Hat Enterprise MRG | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1892 has a moderate severity rating due to its potential to cause denial of service and arbitrary code execution.
To fix CVE-2013-1892, upgrade MongoDB to version 2.0.9 or later, or 2.2.4 or later.
CVE-2013-1892 affects MongoDB versions below 2.0.9 and 2.2.x below 2.2.4.
CVE-2013-1892 allows remote authenticated users to exploit the vulnerability for denial of service or execute arbitrary code.
CVE-2013-1892 is a remote vulnerability that requires authentication to exploit.