CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
96.6%
Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.
Vendor | Product | Version | CPE |
---|---|---|---|
osgeo | mapserver | 4.2.0 | cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:* |
osgeo | mapserver | 4.4.0 | cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:* |
osgeo | mapserver | 4.4.0 | cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:* |
osgeo | mapserver | 4.4.0 | cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:* |
osgeo | mapserver | 4.4.0 | cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:* |
osgeo | mapserver | 4.6.0 | cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:* |
osgeo | mapserver | 4.6.0 | cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:* |
osgeo | mapserver | 4.6.0 | cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:* |
osgeo | mapserver | 4.6.0 | cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:* |
osgeo | mapserver | 4.6.0 | cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:* |
security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz
security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz
trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT
trac.osgeo.org/mapserver/ticket/2943
www.debian.org/security/2009/dsa-1914
www.openwall.com/lists/oss-security/2009/07/01/1
www.openwall.com/lists/oss-security/2009/07/01/6