7.5
CVSSv2

CVE-2010-2060

Published: 08/06/2010 Updated: 13/02/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The put command functionality in beanstalkd 1.4.5 and previous versions allows remote malicious users to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

Vulnerable Product Search on Vulmon Subscribe to Product

wildbit beanstalkd 1.4.3

wildbit beanstalkd 0.9

wildbit beanstalkd 1.3

wildbit beanstalkd

wildbit beanstalkd 0.8

wildbit beanstalkd 1.4

wildbit beanstalkd 0.5

wildbit beanstalkd 1.2

wildbit beanstalkd 1.4.2

wildbit beanstalkd 1.0

wildbit beanstalkd 1.4.1

wildbit beanstalkd 0.6

wildbit beanstalkd 1.4.4

wildbit beanstalkd 0.7

wildbit beanstalkd 0.10

wildbit beanstalkd 1.1

Vendor Advisories

Debian Bug report logs - #585162 CVE-2010-2060 Package: beanstalkd; Maintainer for beanstalkd is Gregory Potamianos <gregpotamianos@gmailcom>; Source for beanstalkd is src:beanstalkd (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 9 Jun 2010 17:03:08 UTC Severity: normal Fixed ...