First published: Wed Jan 20 2016(Updated: )
Integer overflow in the authenticate_post function in CGit before 0.12 allows remote attackers to have unspecified impact via a large value in the Content-Length HTTP header, which triggers a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =22 | |
CGit | <=0.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1901 is classified as a high severity vulnerability due to its potential for remote code execution through a buffer overflow.
To fix CVE-2016-1901, upgrade CGit to version 0.12 or newer.
CVE-2016-1901 affects CGit versions up to and including 0.11.2 and Fedora 22.
CVE-2016-1901 is an integer overflow vulnerability that can lead to a buffer overflow.
Yes, CVE-2016-1901 can be exploited remotely by sending a crafted HTTP request with a large Content-Length header.