First published: Mon Dec 09 2013(Updated: )
A stack overflow flaw was found in the MHD_digest_auth_check() function in libmicrohttpd. If MHD_OPTION_CONNECTION_MEMORY_LIMIT was configured to allow large allocations, a remote attacker could possibly use this flaw to cause an application using libmicrohttpd to crash or, potentially, execute arbitrary code with the privileges of the user running the application. This issue has been resolved in version 0.9.32. References: <a href="https://gnunet.org/svn/libmicrohttpd/ChangeLog">https://gnunet.org/svn/libmicrohttpd/ChangeLog</a> <a href="http://secunia.com/advisories/55903/">http://secunia.com/advisories/55903/</a> <a href="https://bugs.gentoo.org/show_bug.cgi?id=493450">https://bugs.gentoo.org/show_bug.cgi?id=493450</a> Acknowledgements: This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU libmicrohttpd | <=0.9.31 | |
GNU libmicrohttpd | =0.9.16 | |
GNU libmicrohttpd | =0.9.17 | |
GNU libmicrohttpd | =0.9.18 | |
GNU libmicrohttpd | =0.9.19 | |
GNU libmicrohttpd | =0.9.20 | |
GNU libmicrohttpd | =0.9.21 | |
GNU libmicrohttpd | =0.9.22 | |
GNU libmicrohttpd | =0.9.23 | |
GNU libmicrohttpd | =0.9.24 | |
GNU libmicrohttpd | =0.9.25 | |
GNU libmicrohttpd | =0.9.26 | |
GNU libmicrohttpd | =0.9.27 | |
GNU libmicrohttpd | =0.9.28 | |
GNU libmicrohttpd | =0.9.29 | |
GNU libmicrohttpd | =0.9.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.