Vulnerability Description
Multiple stack-based buffer overflows in Tembria Server Monitor before 5.6.1 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted (1) GET, (2) PUT, or (3) HEAD request, as demonstrated by a malformed GET request containing a long PATH_INFO to index.asp.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tembria | Server Monitor | <= 5.6.0 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/39270Vendor Advisory
- http://www.corelan.be:8800/advisories.php?id=CORELAN-10-022
- http://www.corelan.be:8800/wp-content/forum-file-uploads/admin1/exploits/corelan
- http://secunia.com/advisories/39270Vendor Advisory
- http://www.corelan.be:8800/advisories.php?id=CORELAN-10-022
- http://www.corelan.be:8800/wp-content/forum-file-uploads/admin1/exploits/corelan
FAQ
What is CVE-2010-1316?
CVE-2010-1316 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Multiple stack-based buffer overflows in Tembria Server Monitor before 5.6.1 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted (1) GET...
How severe is CVE-2010-1316?
CVE-2010-1316 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-1316?
Check the references section above for vendor advisories and patch information. Affected products include: Tembria Server Monitor.