Vulnerability Description
Stack-based buffer overflow in Monit 1.4 to 4.1 allows remote attackers to execute arbitrary code via a long HTTP request.
CVSS Score
10.0
HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tildeslash | Monit | 1.4 |
References
- http://secunia.com/advisories/10280Patch
- http://security.gentoo.org/glsa/glsa-200403-14.xmlPatch
- http://www.kb.cert.org/vuls/id/623854US Government Resource
- http://www.securityfocus.com/archive/1/345417ExploitVendor Advisory
- http://www.securityfocus.com/bid/9099ExploitPatch
- http://www.tildeslash.com/monit/dist/CHANGES.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13817
- http://secunia.com/advisories/10280Patch
- http://security.gentoo.org/glsa/glsa-200403-14.xmlPatch
- http://www.kb.cert.org/vuls/id/623854US Government Resource
- http://www.securityfocus.com/archive/1/345417ExploitVendor Advisory
- http://www.securityfocus.com/bid/9099ExploitPatch
- http://www.tildeslash.com/monit/dist/CHANGES.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13817
FAQ
What is CVE-2003-1083?
CVE-2003-1083 is a vulnerability with a CVSS score of 10.0 (HIGH). Stack-based buffer overflow in Monit 1.4 to 4.1 allows remote attackers to execute arbitrary code via a long HTTP request.
How severe is CVE-2003-1083?
CVE-2003-1083 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1083?
Check the references section above for vendor advisories and patch information. Affected products include: Tildeslash Monit.