Описание
Heap-based buffer overflow in LiveData Protocol Server 5.00.045, and other versions before update 500062 (5.00.062), allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted request for a WSDL file that causes a negative length to be used in a strncpy call.
Heap-based buffer overflow in LiveData Protocol Server 5.00.045, and other versions before update 500062 (5.00.062), allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted request for a WSDL file that causes a negative length to be used in a strncpy call.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-2489
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34031
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=523
- http://osvdb.org/35529
- http://secunia.com/advisories/25076
- http://www.kb.cert.org/vuls/id/213516
- http://www.securityfocus.com/bid/23773
- http://www.securitytracker.com/id?1017998
- http://www.vupen.com/english/advisories/2007/1633
EPSS
CVE ID
Связанные уязвимости
Heap-based buffer overflow in LiveData Protocol Server 5.00.045, and other versions before update 500062 (5.00.062), allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted request for a WSDL file that causes a negative length to be used in a strncpy call.
EPSS