#VU40857 Heap-based buffer overflow in GoAhead - CVE-2014-9707
Published: March 31, 2015 / Updated: August 9, 2020
GoAhead
EmbedThis
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which. A remote attacker can use a crafted URI. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html
- http://seclists.org/fulldisclosure/2015/Mar/157
- http://www.securityfocus.com/archive/1/535027/100/0/threaded
- http://www.securitytracker.com/id/1032208
- https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77
- https://github.com/embedthis/goahead/issues/106