[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-2892Date: (C)2014-04-23   (M)2023-12-22


Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-57875
BID-66933
DSA-2916
GLSA-201612-29
http://www.openwall.com/lists/oss-security/2014/04/18/14
http://sourceforge.net/p/libmms/code/ci/03bcfccc22919c72742b7338d02859962861e0e8
http://sourceforge.net/p/libmms/code/ci/master/tree/ChangeLog
libmms-getanswer-bo(92640)
openSUSE-SU-2014:0590

CPE    3
cpe:/a:libmms_project:libmms:0.6
cpe:/a:libmms_project:libmms:0.6.1
cpe:/a:libmms_project:libmms:0.6.2
CWE    1
CWE-119
OVAL    1
oval:org.secpod.oval:def:601278

© SecPod Technologies