Stack-based buffer overflow in Monit 1.4 to 4.1 allows remote attackers to execute arbitrary code via a long HTTP request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Monit | Tildeslash | 1.4 (including) | 1.4 (including) |
Monit | Tildeslash | 1.4.1 (including) | 1.4.1 (including) |
Monit | Tildeslash | 2.0 (including) | 2.0 (including) |
Monit | Tildeslash | 2.1 (including) | 2.1 (including) |
Monit | Tildeslash | 2.1.1 (including) | 2.1.1 (including) |
Monit | Tildeslash | 2.2 (including) | 2.2 (including) |
Monit | Tildeslash | 2.2.1 (including) | 2.2.1 (including) |
Monit | Tildeslash | 2.3 (including) | 2.3 (including) |
Monit | Tildeslash | 2.4 (including) | 2.4 (including) |
Monit | Tildeslash | 2.4.1 (including) | 2.4.1 (including) |
Monit | Tildeslash | 2.4.2 (including) | 2.4.2 (including) |
Monit | Tildeslash | 2.4.3 (including) | 2.4.3 (including) |
Monit | Tildeslash | 3.0 (including) | 3.0 (including) |
Monit | Tildeslash | 3.1 (including) | 3.1 (including) |
Monit | Tildeslash | 3.2 (including) | 3.2 (including) |
Monit | Tildeslash | 4.0 (including) | 4.0 (including) |
Monit | Tildeslash | 4.1 (including) | 4.1 (including) |