![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.808150 |
Category: | Databases |
Title: | MongoDB nativeHelper Denial of Service Vulnerability - Linux |
Summary: | MongoDB is prone to a denial of service vulnerability. |
Description: | Summary: MongoDB is prone to a denial of service vulnerability. Vulnerability Insight: An error exists in nativeHelper function in SpiderMonkey which fails to validate requests properly. Vulnerability Impact: Successful exploitation will allow remote authenticated users to cause a denial of service condition or execute arbitrary code via a crafted memory address in the first argument. Affected Software/OS: MongoDB version before 2.0.9 and 2.2.x before 2.2.4 on Linux Solution: Upgrade to MongoDB version 2.0.9 or 2.2.4 or 2.4.2 or later. CVSS Score: 6.0 CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-1892 24935 http://www.exploit-db.com/exploits/24935 24947 http://www.exploit-db.com/exploits/24947 FEDORA-2013-4531 http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101679.html FEDORA-2013-4539 http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101630.html RHSA-2013:1170 http://rhn.redhat.com/errata/RHSA-2013-1170.html [oss-security] 20130325 Re: CVE Request: Mongo DB http://www.openwall.com/lists/oss-security/2013/03/25/9 http://blog.scrt.ch/2013/03/24/mongodb-0-day-ssji-to-rce/ http://www.mongodb.org/about/alerts/ https://jira.mongodb.org/browse/SERVER-9124 |
Copyright | Copyright (C) 2016 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |