Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9r5g-wj95-f57q

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action.

Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action.

EPSS

Процентиль: 92%
0.08317
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 16 лет назад

Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action.

nvd
больше 16 лет назад

Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action.

debian
больше 16 лет назад

Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x b ...

EPSS

Процентиль: 92%
0.08317
Низкий

Дефекты

CWE-119