Name | CVE-2010-2060 |
Description | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 585162 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
beanstalkd (PTS) | sid, trixie, bookworm, bullseye | 1.12-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
beanstalkd | source | (unstable) | 1.4.6-1 | unimportant | | 585162 |
Notes
Package description reads: "Beanstalkd is meant to be ran in a trusted network,
"as it has no authorisation/authentication mechanisms". So this is likely a non-issue