Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd prior to 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu libmicrohttpd 0.9.29 |
||
gnu libmicrohttpd 0.9.28 |
||
gnu libmicrohttpd 0.9.21 |
||
gnu libmicrohttpd 0.9.20 |
||
gnu libmicrohttpd |
||
gnu libmicrohttpd 0.9.30 |
||
gnu libmicrohttpd 0.9.23 |
||
gnu libmicrohttpd 0.9.22 |
||
gnu libmicrohttpd 0.9.25 |
||
gnu libmicrohttpd 0.9.24 |
||
gnu libmicrohttpd 0.9.17 |
||
gnu libmicrohttpd 0.9.16 |
||
gnu libmicrohttpd 0.9.27 |
||
gnu libmicrohttpd 0.9.26 |
||
gnu libmicrohttpd 0.9.19 |
||
gnu libmicrohttpd 0.9.18 |