The put command functionality in beanstalkd 1.4.5 and previous versions allows remote malicious users to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wildbit beanstalkd 1.4.3 |
||
wildbit beanstalkd 0.9 |
||
wildbit beanstalkd 1.3 |
||
wildbit beanstalkd |
||
wildbit beanstalkd 0.8 |
||
wildbit beanstalkd 1.4 |
||
wildbit beanstalkd 0.5 |
||
wildbit beanstalkd 1.2 |
||
wildbit beanstalkd 1.4.2 |
||
wildbit beanstalkd 1.0 |
||
wildbit beanstalkd 1.4.1 |
||
wildbit beanstalkd 0.6 |
||
wildbit beanstalkd 1.4.4 |
||
wildbit beanstalkd 0.7 |
||
wildbit beanstalkd 0.10 |
||
wildbit beanstalkd 1.1 |