CVE-2010-2060
08.06.2010, 00:30
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.Enginsight
| Vendor | Product | Version |
|---|---|---|
| wildbit | beanstalkd | 𝑥 ≤ 1.4.5 |
| wildbit | beanstalkd | 0.5 |
| wildbit | beanstalkd | 0.6 |
| wildbit | beanstalkd | 0.7 |
| wildbit | beanstalkd | 0.8 |
| wildbit | beanstalkd | 0.9 |
| wildbit | beanstalkd | 0.10 |
| wildbit | beanstalkd | 1.0 |
| wildbit | beanstalkd | 1.1 |
| wildbit | beanstalkd | 1.2 |
| wildbit | beanstalkd | 1.3 |
| wildbit | beanstalkd | 1.4 |
| wildbit | beanstalkd | 1.4.1 |
| wildbit | beanstalkd | 1.4.2 |
| wildbit | beanstalkd | 1.4.3 |
| wildbit | beanstalkd | 1.4.4 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
References