Description
Multiple stack-based buffer overflows in Tembria Server Monitor before 5.6.1 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted (1) GET, (2) PUT, or (3) HEAD request, as demonstrated by a malformed GET request containing a long PATH_INFO to index.asp.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Lincoln · pythondoswindows
https://www.exploit-db.com/exploits/12131
References (3)
Core 3
Core References
Various Sources x_refsource_misc
http://www.corelan.be:8800/wp-content/forum-file-uploads/admin1/exploits/corelan_lincoln_tembria.py_.txt
Various Sources x_refsource_misc
http://www.corelan.be:8800/advisories.php?id=CORELAN-10-022
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39270
Scores
EPSS
0.0626
EPSS Percentile
91.0%
Details
CWE
CWE-119
Status
published
Products (1)
tembria/server_monitor
< 5.6.0
Published
Apr 14, 2010
Tracked Since
Feb 18, 2026