MGASA-2014-0030

Source
https://advisories.mageia.org/MGASA-2014-0030.html
Import Source
https://advisories.mageia.org/MGASA-2014-0030.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0030
Related
Published
2014-01-31T16:42:00Z
Modified
2014-01-31T16:41:54Z
Summary
Updated libmicrohttpd package fixes security vulnerabilities
Details

The MHDhttpunescape function in libmicrohttpd before 0.9.32 might allow remote attackers to obtain sensitive information or cause a denial of service (crash) via unspecified vectors that trigger an out-of-bounds read (CVE-2013-7038).

Stack-based buffer overflow in the MHDdigestauthcheck function in libmicrohttpd before 0.9.32, when MHDOPTIONCONNECTIONMEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header (CVE-2013-7039).

References
Credits

Affected packages

Mageia:3 / libmicrohttpd

Package

Name
libmicrohttpd
Purl
pkg:rpm/mageia/libmicrohttpd?arch=source&distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.33-1.mga3

Ecosystem specific

{
    "section": "core"
}