Vulnerability Description
Heap-based buffer overflow in httpAdapter.c in httpAdapter in SBLIM SFCB before 1.3.8 might allow remote attackers to execute arbitrary code via a Content-Length HTTP header that specifies a value too small for the amount of POST data, aka bug #3001896.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Standards Based Linux Instrumentation | Sblim-Sfcb | <= 1.3.7 |
Related Weaknesses (CWE)
References
- http://marc.info/?l=bugtraq&m=127549079109192&w=2
- http://sblim.cvs.sourceforge.net/viewvc/sblim/sfcb/httpAdapter.c?r1=1.84&r2=1.85
- http://secunia.com/advisories/40018Vendor Advisory
- http://sourceforge.net/tracker/index.php?func=detail&aid=3001896&group_id=128809
- http://www.vupen.com/english/advisories/2010/1312Vendor Advisory
- http://marc.info/?l=bugtraq&m=127549079109192&w=2
- http://sblim.cvs.sourceforge.net/viewvc/sblim/sfcb/httpAdapter.c?r1=1.84&r2=1.85
- http://secunia.com/advisories/40018Vendor Advisory
- http://sourceforge.net/tracker/index.php?func=detail&aid=3001896&group_id=128809
- http://www.vupen.com/english/advisories/2010/1312Vendor Advisory
FAQ
What is CVE-2010-1937?
CVE-2010-1937 is a vulnerability with a CVSS score of 10.0 (HIGH). Heap-based buffer overflow in httpAdapter.c in httpAdapter in SBLIM SFCB before 1.3.8 might allow remote attackers to execute arbitrary code via a Content-Length HTTP header that specifies a value too...
How severe is CVE-2010-1937?
CVE-2010-1937 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-1937?
Check the references section above for vendor advisories and patch information. Affected products include: Standards Based Linux Instrumentation Sblim-Sfcb.