Описание
Multiple stack-based buffer overflows in src/Task.cc in the FastCGI program in IIPImage Server before 0.9.8 might allow remote attackers to execute arbitrary code via vectors associated with crafted arguments to the (1) RGN::run, (2) JTLS::run, or (3) SHD::run function. NOTE: some of these details are obtained from third party information.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.9.7 (включая)
Одно из
cpe:2.3:a:ruven_pillay:iipimage_server:*:*:*:*:*:*:*:*
cpe:2.3:a:ruven_pillay:iipimage_server:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:ruven_pillay:iipimage_server:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:ruven_pillay:iipimage_server:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:ruven_pillay:iipimage_server:0.9.6:*:*:*:*:*:*:*
EPSS
Процентиль: 86%
0.02695
Низкий
7.5 High
CVSS2
Дефекты
CWE-119
Связанные уязвимости
github
почти 4 года назад
Multiple stack-based buffer overflows in src/Task.cc in the FastCGI program in IIPImage Server before 0.9.8 might allow remote attackers to execute arbitrary code via vectors associated with crafted arguments to the (1) RGN::run, (2) JTLS::run, or (3) SHD::run function. NOTE: some of these details are obtained from third party information.
EPSS
Процентиль: 86%
0.02695
Низкий
7.5 High
CVSS2
Дефекты
CWE-119