Multiple stack-based buffer overflows in src/Task.cc in the FastCGI program in IIPImage Server before 0.9.8 might allow remote attackers to execute arbitrary code via vectors associated with crafted arguments to the (1) RGN::run, (2) JTLS::run, or (3) SHD::run function. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://freshmeat.net/projects/iipimage/releases/309013 | |
http://iipimage.sourceforge.net/blog/ | Vendor Advisory |
http://secunia.com/advisories/37565 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2009-12-08 19:30
Updated : 2024-02-28 11:21
NVD link : CVE-2009-4230
Mitre link : CVE-2009-4230
CVE.ORG link : CVE-2009-4230
JSON object : View
Products Affected
ruven_pillay
- iipimage_server
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer