Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-1771

Опубликовано: 16 апр. 2008
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Integer overflow in the ws_getpostvars function in Firefly Media Server (formerly mt-daapd) 0.2.4.1 (0.9~r1696-1.2 on Debian) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a large Content-Length.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

0.9~r1696-1.3build1
feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

released

0.9~r1696-1.1ubuntu0.1
intrepid

not-affected

0.9~r1696-1.3build1
upstream

released

0.9~r1696-1.3

Показывать по

Ссылки на источники

EPSS

Процентиль: 88%
0.0401
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

Integer overflow in the ws_getpostvars function in Firefly Media Server (formerly mt-daapd) 0.2.4.1 (0.9~r1696-1.2 on Debian) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a large Content-Length.

nvd
больше 17 лет назад

Integer overflow in the ws_getpostvars function in Firefly Media Server (formerly mt-daapd) 0.2.4.1 (0.9~r1696-1.2 on Debian) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a large Content-Length.

debian
больше 17 лет назад

Integer overflow in the ws_getpostvars function in Firefly Media Serve ...

github
больше 3 лет назад

Integer overflow in the ws_getpostvars function in Firefly Media Server (formerly mt-daapd) 0.2.4.1 (0.9~r1696-1.2 on Debian) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a large Content-Length.

EPSS

Процентиль: 88%
0.0401
Низкий

7.5 High

CVSS2