Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name.
References
Configurations
History
21 Nov 2024, 00:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/ - Patch | |
References | () http://secunia.com/advisories/26561 - | |
References | () http://secunia.com/advisories/26718 - | |
References | () http://secunia.com/advisories/29688 - | |
References | () http://securityreason.com/securityalert/3082 - | |
References | () http://trac.osgeo.org/mapserver/ticket/2252 - | |
References | () http://www.debian.org/security/2008/dsa-1539 - | |
References | () http://www.securityfocus.com/bid/25582 - | |
References | () http://www.vupen.com/english/advisories/2007/2974 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=272081 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html - |
Information
Published : 2007-08-31 01:17
Updated : 2024-11-21 00:36
NVD link : CVE-2007-4629
Mitre link : CVE-2007-4629
CVE.ORG link : CVE-2007-4629
JSON object : View
Products Affected
university_of_minnesota
- mapserver
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer