First published: Mon Dec 09 2013(Updated: )
A stack overflow flaw was found in the MHD_digest_auth_check() function in libmicrohttpd. If MHD_OPTION_CONNECTION_MEMORY_LIMIT was configured to allow large allocations, a remote attacker could possibly use this flaw to cause an application using libmicrohttpd to crash or, potentially, execute arbitrary code with the privileges of the user running the application. This issue has been resolved in version 0.9.32. References: <a href="https://gnunet.org/svn/libmicrohttpd/ChangeLog">https://gnunet.org/svn/libmicrohttpd/ChangeLog</a> <a href="http://secunia.com/advisories/55903/">http://secunia.com/advisories/55903/</a> <a href="https://bugs.gentoo.org/show_bug.cgi?id=493450">https://bugs.gentoo.org/show_bug.cgi?id=493450</a> Acknowledgements: This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libmicrohttpd | <=0.9.31 | |
Libmicrohttpd | =0.9.16 | |
Libmicrohttpd | =0.9.17 | |
Libmicrohttpd | =0.9.18 | |
Libmicrohttpd | =0.9.19 | |
Libmicrohttpd | =0.9.20 | |
Libmicrohttpd | =0.9.21 | |
Libmicrohttpd | =0.9.22 | |
Libmicrohttpd | =0.9.23 | |
Libmicrohttpd | =0.9.24 | |
Libmicrohttpd | =0.9.25 | |
Libmicrohttpd | =0.9.26 | |
Libmicrohttpd | =0.9.27 | |
Libmicrohttpd | =0.9.28 | |
Libmicrohttpd | =0.9.29 | |
Libmicrohttpd | =0.9.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7039 has a medium severity level due to its potential to cause application crashes or arbitrary code execution.
To fix CVE-2013-7039, update libmicrohttpd to version 0.9.31 or later.
CVE-2013-7039 affects versions of libmicrohttpd up to and including 0.9.30.
Yes, CVE-2013-7039 can be exploited remotely by attackers sending specially crafted requests.
A potential workaround for CVE-2013-7039 is to restrict the MHD_OPTION_CONNECTION_MEMORY_LIMIT configuration.