{"id":"MGASA-2014-0030","summary":"Updated libmicrohttpd package fixes security vulnerabilities","details":"The MHD_http_unescape function in libmicrohttpd before 0.9.32 might allow\nremote attackers to obtain sensitive information or cause a denial of\nservice (crash) via unspecified vectors that trigger an out-of-bounds read\n(CVE-2013-7038).\n\nStack-based buffer overflow in the MHD_digest_auth_check function in\nlibmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is\nset to a large value, allows remote attackers to cause a denial of service\n(crash) or possibly execute arbitrary code via a long URI in an\nauthentication header (CVE-2013-7039).\n","modified":"2026-04-16T06:26:07.808122388Z","published":"2014-01-31T16:42:00Z","upstream":["CVE-2013-7038","CVE-2013-7039"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0030.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=11936"},{"type":"ADVISORY","url":"http://secunia.com/advisories/55903/"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2014-January/127159.html"}],"affected":[{"package":{"name":"libmicrohttpd","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/libmicrohttpd?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.33-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0030.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}