First published: Mon Dec 09 2013(Updated: )
A stack overflow flaw was found in the MHD_digest_auth_check() function in libmicrohttpd. If MHD_OPTION_CONNECTION_MEMORY_LIMIT was configured to allow large allocations, a remote attacker could possibly use this flaw to cause an application using libmicrohttpd to crash or, potentially, execute arbitrary code with the privileges of the user running the application. This issue has been resolved in version 0.9.32. References: <a href="https://gnunet.org/svn/libmicrohttpd/ChangeLog">https://gnunet.org/svn/libmicrohttpd/ChangeLog</a> <a href="http://secunia.com/advisories/55903/">http://secunia.com/advisories/55903/</a> <a href="https://bugs.gentoo.org/show_bug.cgi?id=493450">https://bugs.gentoo.org/show_bug.cgi?id=493450</a> Acknowledgements: This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Affected Software | Affected Version | How to fix |
---|---|---|
Libmicrohttpd | <0.9.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1039390 is classified as a critical vulnerability due to the potential for remote code execution and application crashes.
To fix REDHAT-BUG-1039390, update to the latest version of libmicrohttpd that addresses the vulnerability.
REDHAT-BUG-1039390 affects GNU libmicrohttpd versions up to and including 0.9.32.
The vulnerability in REDHAT-BUG-1039390 is a stack overflow that occurs in the MHD_digest_auth_check() function.
Yes, a remote attacker can exploit REDHAT-BUG-1039390 if the MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to allow large memory allocations.