Описание
Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.6.4-1 |
| esm-apps/xenial | not-affected | 0.6.4-1 |
| esm-infra-legacy/trusty | released | 0.6.2-3ubuntu2.1 |
| lucid | ignored | end of life |
| precise | released | 0.6.2-2ubuntu0.1 |
| quantal | ignored | end of life |
| saucy | ignored | end of life |
| trusty | released | 0.6.2-3ubuntu2.1 |
| trusty/esm | released | 0.6.2-3ubuntu2.1 |
| upstream | released | 0.6.2-4 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
Heap-based buffer overflow in the get_answer function in mmsh.c in lib ...
Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.5 High
CVSS2