Vulnerability Details : CVE-2013-7039
Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-7039
Probability of exploitation activity in the next 30 days: 3.89%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 91 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-7039
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
CWE ids for CVE-2013-7039
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-7039
-
http://www.securityfocus.com/bid/64138
Libmicrohttpd Multiple Remote Security Vulnerabilities
-
https://bugs.gentoo.org/show_bug.cgi?id=493450
493450 – (CVE-2013-7038) <net-libs/libmicrohttpd-0.9.32 : Two Vulnerabilities (CVE-2013-{7038,7039})
-
http://www.openwall.com/lists/oss-security/2013/12/09/11
oss-security - Re: CVE request: two issues in libmicrohttpd
-
https://gnunet.org/svn/libmicrohttpd/ChangeLog
404 Not Found
-
https://bugzilla.redhat.com/show_bug.cgi?id=1039390
1039390 – (CVE-2013-7039) CVE-2013-7039 libmicrohttpd: stack overflow in MHD_digest_auth_check()
-
http://security.gentoo.org/glsa/glsa-201402-01.xml
GNU libmicrohttpd: Multiple vulnerabilities (GLSA 201402-01) — Gentoo security
Products affected by CVE-2013-7039
- cpe:2.3:a:gnu:libmicrohttpd:*:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.29:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.28:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.21:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.20:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.30:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.23:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.22:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.25:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.24:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.17:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.16:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.27:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.26:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.19:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:libmicrohttpd:0.9.18:*:*:*:*:*:*:*