Unrated severityNVD Advisory· Published Jun 8, 2010· Updated Apr 29, 2026
CVE-2010-2060
CVE-2010-2060
Description
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
Affected products
16cpe:2.3:a:wildbit:beanstalkd:*:*:*:*:*:*:*:*+ 15 more
- cpe:2.3:a:wildbit:beanstalkd:*:*:*:*:*:*:*:*range: <=1.4.5
- cpe:2.3:a:wildbit:beanstalkd:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:0.5:-:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:wildbit:beanstalkd:1.4.4:*:*:*:*:*:*:*
Patches
12e8e8c6387ecDiscard job body bytes if the job is too big.
4 files changed · +7 −2
check-one.sh+1 −1 modified@@ -34,7 +34,7 @@ if [ ! -x ./beanstalkd ]; then exit 2 fi -start_beanstalkd +start_beanstalkd '' '-z 10' # Run the test fgrep -v "#" $commands | $nc $server $port > "$tmpf"
prot.c+2 −1 modified@@ -1196,7 +1196,8 @@ dispatch_cmd(conn c) if (errno) return reply_msg(c, MSG_BAD_FORMAT); if (body_size > job_data_size_limit) { - return reply_msg(c, MSG_JOB_TOO_BIG); + /* throw away the job body and respond with JOB_TOO_BIG */ + return skip(c, body_size + 2, MSG_JOB_TOO_BIG); } /* don't allow trailing garbage */
sh-tests/too-big.commands+3 −0 added@@ -0,0 +1,3 @@ +put 0 0 0 11 +delete 9999 +quit
sh-tests/too-big.expected+1 −0 added@@ -0,0 +1 @@ +JOB_TOO_BIG
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6News mentions
0No linked articles in our index yet.