Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz - Patch | |
References | () http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz - Patch | |
References | () http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT - | |
References | () http://trac.osgeo.org/mapserver/ticket/2943 - | |
References | () http://www.debian.org/security/2009/dsa-1914 - | |
References | () http://www.openwall.com/lists/oss-security/2009/07/01/1 - | |
References | () http://www.openwall.com/lists/oss-security/2009/07/01/6 - |
Information
Published : 2009-10-23 18:30
Updated : 2024-11-21 01:04
NVD link : CVE-2009-2281
Mitre link : CVE-2009-2281
CVE.ORG link : CVE-2009-2281
JSON object : View
Products Affected
osgeo
- mapserver
umn
- mapserver
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer