Search criteria

42 vulnerabilities found for mapserver by umn

FKIE_CVE-2013-7262

Vulnerability from fkie_nvd - Published: 2014-01-05 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70E7C5A-FD95-433E-AFC9-125E02601C01",
              "versionEndIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3463E320-A38C-4D06-BE66-DB20AC9994E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C99339E6-87F2-4571-9789-4593381849AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "320F9C32-C57F-457E-9238-183FFCB633C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDFE5FE6-9AFB-4C18-9B30-F13273D4B1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "375C147D-82EF-4582-91F1-67EE0196BB5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A7F401-1829-440B-A7D0-08515F73E11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6A01342-B989-4134-8692-8BD8A42B93D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43392C7-AC41-47CE-80B6-4AF935535D58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6AA556-0F19-4B6B-BF83-7C04FA7224A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A74989-30DD-4706-835F-A26A5A214A5A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n msPostGISLayerSetTimeFilter en mappostgis.c en MapServer anterior a v6.4.1, cuando un servicio WMS-Time es utilizado permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de una cadena manipulada en un filtro PostGIS TIME."
    }
  ],
  "id": "CVE-2013-7262",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-05T20:55:04.147",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/64671"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/mapserver/mapserver/issues/4834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/64671"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/mapserver/mapserver/issues/4834"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-2975

Vulnerability from fkie_nvd - Published: 2011-08-01 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data.
Impacted products
Vendor Product Version
osgeo mapserver *
osgeo mapserver 4.2.0
osgeo mapserver 4.4.0
osgeo mapserver 4.4.0
osgeo mapserver 4.4.0
osgeo mapserver 4.4.0
osgeo mapserver 4.6.0
osgeo mapserver 4.6.0
osgeo mapserver 4.6.0
osgeo mapserver 4.6.0
osgeo mapserver 4.6.0
osgeo mapserver 4.8.0
osgeo mapserver 4.8.0
osgeo mapserver 4.8.0
osgeo mapserver 4.8.0
osgeo mapserver 4.8.0
osgeo mapserver 4.10.0
osgeo mapserver 4.10.0
osgeo mapserver 4.10.0
osgeo mapserver 4.10.0
osgeo mapserver 4.10.0
osgeo mapserver 4.10.1
osgeo mapserver 4.10.2
osgeo mapserver 4.10.3
osgeo mapserver 4.10.4
osgeo mapserver 4.10.5
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.1
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.1
osgeo mapserver 5.4.2
osgeo mapserver 5.6.0
osgeo mapserver 5.6.1
osgeo mapserver 5.6.3
umn mapserver 4.10.7
umn mapserver 5.2.2
umn mapserver 5.2.3
umn mapserver 5.6.4
umn mapserver 5.6.5
umn mapserver 5.6.6
umn mapserver 5.6.7
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8186CBBA-930C-4056-B375-DAD5DED37556",
              "versionEndIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3463E320-A38C-4D06-BE66-DB20AC9994E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C99339E6-87F2-4571-9789-4593381849AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "00063772-1E7D-406F-A390-7B4FB21A6096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "17721EF7-4B68-44F4-B38B-B1A1598ACC94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43392C7-AC41-47CE-80B6-4AF935535D58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8C37B7-14D9-40A8-A0EA-B92AE91E9222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC26637-E186-4C95-B9EA-12A96919FE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00721EA-2D0C-45AD-A909-450141400489",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6AA556-0F19-4B6B-BF83-7C04FA7224A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FCDF813C-781A-44E4-99EB-9716F9789A6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "6848D95B-9682-4017-86C5-91E979E27D2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "F76F63E7-D36E-4061-B26C-260C6DE3934F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "88061976-D6E6-44A6-B765-32ACA74F7A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "57041185-4A72-4A74-95CB-DC902947085E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "2F8C35E8-AB54-4D24-9AE1-A1FF69E81298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "8F66DF75-3621-45DF-B0FC-5C7EB928FB4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C816A56D-1139-4AFA-A457-966522EF6150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D30020CA-CFAD-49B0-9340-89AB48CE60E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data."
    },
    {
      "lang": "es",
      "value": "Doble vulnerabilidad libre en la funci\u00f3n msAddImageSymbol en mapsymbol.c en MapServer anterior a v6.0.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) o tener otro impacto no especificado a trav\u00e9s de datos mapfile manipulados."
    }
  ],
  "id": "CVE-2011-2975",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-08-01T20:55:01.273",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/3939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/3939"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-2704

Vulnerability from fkie_nvd - Published: 2011-08-01 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding.
References
secalert@redhat.comhttp://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.htmlPatch
secalert@redhat.comhttp://secunia.com/advisories/45257Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45368Vendor Advisory
secalert@redhat.comhttp://trac.osgeo.org/mapserver/ticket/3903Patch
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2285
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/07/19/14Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/07/20/15Patch
secalert@redhat.comhttp://www.securityfocus.com/bid/48720
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=723293Patch
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/68719
af854a3a-2127-422b-91ae-364da2661108http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45257Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45368Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://trac.osgeo.org/mapserver/ticket/3903Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2285
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/07/19/14Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/07/20/15Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/48720
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=723293Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/68719

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6823B0AE-FBC3-4E49-9BB4-64A39435B328",
              "versionEndIncluding": "4.10.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3463E320-A38C-4D06-BE66-DB20AC9994E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C99339E6-87F2-4571-9789-4593381849AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "17721EF7-4B68-44F4-B38B-B1A1598ACC94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43392C7-AC41-47CE-80B6-4AF935535D58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8C37B7-14D9-40A8-A0EA-B92AE91E9222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC26637-E186-4C95-B9EA-12A96919FE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00721EA-2D0C-45AD-A909-450141400489",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en MapServer anterior a v4.10.7 y v5.x anterior a v5.6.7 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores relacionados con el filtro codificado OGC."
    }
  ],
  "id": "CVE-2011-2704",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-08-01T19:55:01.477",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45257"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45368"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/3903"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2285"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/48720"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/3903"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2285"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48720"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-2703

Vulnerability from fkie_nvd - Published: 2011-08-01 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support.
References
secalert@redhat.comhttp://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.htmlPatch
secalert@redhat.comhttp://secunia.com/advisories/45257Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45318Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45368Vendor Advisory
secalert@redhat.comhttp://trac.osgeo.org/mapserver/ticket/3903Patch
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2285
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/07/19/11Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/07/19/14Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/07/20/15Patch
secalert@redhat.comhttp://www.securityfocus.com/bid/48720
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=722545Patch
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=723293Patch
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/68682
af854a3a-2127-422b-91ae-364da2661108http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45257Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45318Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45368Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://trac.osgeo.org/mapserver/ticket/3903Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2285
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/07/19/11Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/07/19/14Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/07/20/15Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/48720
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=722545Patch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=723293Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/68682
Impacted products
Vendor Product Version
osgeo mapserver *
osgeo mapserver 4.2.0
osgeo mapserver 4.4.0
osgeo mapserver 4.4.0
osgeo mapserver 4.4.0
osgeo mapserver 4.4.0
osgeo mapserver 4.6.0
osgeo mapserver 4.6.0
osgeo mapserver 4.6.0
osgeo mapserver 4.6.0
osgeo mapserver 4.6.0
osgeo mapserver 4.8.0
osgeo mapserver 4.8.0
osgeo mapserver 4.8.0
osgeo mapserver 4.8.0
osgeo mapserver 4.8.0
osgeo mapserver 4.10.0
osgeo mapserver 4.10.0
osgeo mapserver 4.10.0
osgeo mapserver 4.10.0
osgeo mapserver 4.10.0
osgeo mapserver 4.10.1
osgeo mapserver 4.10.2
osgeo mapserver 4.10.3
osgeo mapserver 4.10.4
osgeo mapserver 4.10.5
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.0.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.0
osgeo mapserver 5.2.1
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.0
osgeo mapserver 5.4.1
osgeo mapserver 5.4.2
osgeo mapserver 5.6.0
osgeo mapserver 5.6.1
osgeo mapserver 5.6.3
umn mapserver 5.2.2
umn mapserver 5.2.3
umn mapserver 5.6.4
umn mapserver 5.6.5
umn mapserver 5.6.6
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0
umn mapserver 6.0.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6823B0AE-FBC3-4E49-9BB4-64A39435B328",
              "versionEndIncluding": "4.10.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3463E320-A38C-4D06-BE66-DB20AC9994E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C99339E6-87F2-4571-9789-4593381849AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "17721EF7-4B68-44F4-B38B-B1A1598ACC94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43392C7-AC41-47CE-80B6-4AF935535D58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8C37B7-14D9-40A8-A0EA-B92AE91E9222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC26637-E186-4C95-B9EA-12A96919FE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:5.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00721EA-2D0C-45AD-A909-450141400489",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A74989-30DD-4706-835F-A26A5A214A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FCDF813C-781A-44E4-99EB-9716F9789A6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "6848D95B-9682-4017-86C5-91E979E27D2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "F76F63E7-D36E-4061-B26C-260C6DE3934F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "88061976-D6E6-44A6-B765-32ACA74F7A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "57041185-4A72-4A74-95CB-DC902947085E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "2F8C35E8-AB54-4D24-9AE1-A1FF69E81298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "8F66DF75-3621-45DF-B0FC-5C7EB928FB4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C816A56D-1139-4AFA-A457-966522EF6150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:6.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D30020CA-CFAD-49B0-9340-89AB48CE60E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en MapServer anterior a v4.10.7, y v5.x anterior a v5.6.7, y v6.x anterior a v6.0.1 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de vectores relacionados con (1) filtros codificados OGC o (2) tiempo de soporte WMS."
    }
  ],
  "id": "CVE-2011-2703",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-08-01T19:55:01.427",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45257"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45318"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45368"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/3903"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2285"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/48720"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/3903"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2285"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48720"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2010-2539

Vulnerability from fkie_nvd - Published: 2010-08-02 22:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8F303A-608D-4654-9D47-48DFF37AE112",
              "versionEndIncluding": "4.10.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "769B10FF-3175-43DB-9808-8E7712F6E6BB",
              "versionEndIncluding": "5.6.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en la funci\u00f3n msTmpFile  en maputil.c en mapserv en MapServer en versiones anteriores a la 4.10.6 y 5.x en versiones anteriores a la 5.6.4, permite a usuarios locales provocar una denegaci\u00f3n de servicio mediante vectores que involucran nombres de ficheros temporales."
    }
  ],
  "id": "CVE-2010-2539",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-02T22:00:01.247",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/3484"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/41855"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/3484"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/41855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2010-2540

Vulnerability from fkie_nvd - Published: 2010-08-02 22:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8F303A-608D-4654-9D47-48DFF37AE112",
              "versionEndIncluding": "4.10.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "769B10FF-3175-43DB-9808-8E7712F6E6BB",
              "versionEndIncluding": "5.6.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments."
    },
    {
      "lang": "es",
      "value": "mapserv.c en mapserv en MapServer en versiones anteriores a la 4.10.6 y 5.x en versiones anteriores a la 5.6.4 no restringe de manera apropiada el uso de argumentos de linea de comandos CGI que se establecieron para depuraci\u00f3n, lo que permite a atacantes remotos tener un impacto no especificado mediante argumentos manipulados."
    }
  ],
  "id": "CVE-2010-2540",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-02T22:00:01.297",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://trac.osgeo.org/mapserver/ticket/3485"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/41855"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.osgeo.org/mapserver/ticket/3485"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/41855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-2281

Vulnerability from fkie_nvd - Published: 2009-10-23 18:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamiento de b\u00fafer basados en memoria din\u00e1mica en la funci\u00f3n readPostBody en cgiutil.c de mapserv en MapServer v4.x hasta v4.10.4 y v5.x anteriores a v5.4.2, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de (1) una cabecera de HTTP \"Content-Length\" manipulada o (2) una petici\u00f3n HTTP larga, relacionado con un desbordamiento de entero que provoca una desbordamiento de b\u00fafer basado en memoria din\u00e1mica. NOTA: Esta vulnerabilidad existe por un correcci\u00f3n incompleta de CVE-2009-0840."
    }
  ],
  "id": "CVE-2009-2281",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-10-23T18:30:00.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.osgeo.org/mapserver/ticket/2943"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.osgeo.org/mapserver/ticket/2943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-0839

Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action.
References
cve@mitre.orghttp://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html
cve@mitre.orghttp://secunia.com/advisories/34520
cve@mitre.orghttp://secunia.com/advisories/34603
cve@mitre.orghttp://trac.osgeo.org/mapserver/ticket/2944Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1914
cve@mitre.orghttp://www.positronsecurity.com/advisories/2009-000.htmlExploit
cve@mitre.orghttp://www.securityfocus.com/archive/1/502271/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/34306
cve@mitre.orghttp://www.securitytracker.com/id?1021952
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html
af854a3a-2127-422b-91ae-364da2661108http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34520
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34603
af854a3a-2127-422b-91ae-364da2661108http://trac.osgeo.org/mapserver/ticket/2944Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1914
af854a3a-2127-422b-91ae-364da2661108http://www.positronsecurity.com/advisories/2009-000.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/502271/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34306
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021952
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en mapserv.c en mapserv en MapServer v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2, cuando el servidor  tiene un mapa con un atributo largo IMAGEPATH O NAME, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un par\u00e1metro \"id\" manipulado en una acci\u00f3n \"query\"."
    }
  ],
  "id": "CVE-2009-0839",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-31T18:24:45.827",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34520"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/2944"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/2944"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-0843

Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
The msLoadQuery function in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to determine the existence of arbitrary files via a full pathname in the queryfile parameter, which triggers different error messages depending on whether this pathname exists.
References
cve@mitre.orghttp://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.htmlPatch
cve@mitre.orghttp://secunia.com/advisories/34520
cve@mitre.orghttp://secunia.com/advisories/34603
cve@mitre.orghttp://trac.osgeo.org/mapserver/ticket/2939
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1914
cve@mitre.orghttp://www.positronsecurity.com/advisories/2009-000.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/502271/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/34306
cve@mitre.orghttp://www.securitytracker.com/id?1021952
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html
af854a3a-2127-422b-91ae-364da2661108http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34520
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34603
af854a3a-2127-422b-91ae-364da2661108http://trac.osgeo.org/mapserver/ticket/2939
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1914
af854a3a-2127-422b-91ae-364da2661108http://www.positronsecurity.com/advisories/2009-000.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/502271/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34306
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021952
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The msLoadQuery function in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to determine the existence of arbitrary files via a full pathname in the queryfile parameter, which triggers different error messages depending on whether this pathname exists."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n msLoadQuery  mapserv en MapServer v4.x y anteriores, v4.10.4 y v5.x anteriores v5.2.2, permite a atacantes remotos determinar la existencia de ficheros a trav\u00e9s de un Path completo en el par\u00e1metro queryfile, lo que provoca diferentes mensajes de error dependiendo de si existe la ruta."
    }
  ],
  "id": "CVE-2009-0843",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 7.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-31T18:24:45.920",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34520"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.osgeo.org/mapserver/ticket/2939"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.osgeo.org/mapserver/ticket/2939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-1176

Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 does not ensure that the string holding the id parameter ends in a '\0' character, which allows remote attackers to conduct buffer-overflow attacks or have unspecified other impact via a long id parameter in a query action.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 does not ensure that the string holding the id parameter ends in a \u0027\\0\u0027 character, which allows remote attackers to conduct buffer-overflow attacks or have unspecified other impact via a long id parameter in a query action."
    },
    {
      "lang": "es",
      "value": "mapserv.c en mapserv en MapServer v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2 no garantiza que la cadena que soporta el par\u00e1metro \"id\" finalice en un car\u00e1cter \u0027\\0\u0027, lo que permite a atacantes remotos dirigir un ataque de desbordamiento de b\u00fafer o tener un otro impacto sin especificar a trav\u00e9s de un par\u00e1metro \"id\" largo en una acci\u00f3n de consulta."
    }
  ],
  "id": "CVE-2009-1176",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-31T18:24:45.967",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-1177

Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in maptemplate.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 have unknown impact and remote attack vectors.
References

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in maptemplate.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 have unknown impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "Desbordamiento m\u00faltiple de b\u00fafer basado en pila en el archivo maptemplate.c en mapserv en MapServer v4.x anteriores a v4.10.4 y v5.x anteriores a v5.2.2 con impacto desconocido y vectores de ataque remoto."
    }
  ],
  "id": "CVE-2009-1177",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-31T18:24:45.983",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.osgeo.org/mapserver/ticket/2944"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.osgeo.org/mapserver/ticket/2944"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-0840

Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
Heap-based buffer underflow in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to have an unknown impact via a negative value in the Content-Length HTTP header.
References
cve@mitre.orghttp://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.htmlPatch
cve@mitre.orghttp://secunia.com/advisories/34520
cve@mitre.orghttp://secunia.com/advisories/34603
cve@mitre.orghttp://trac.osgeo.org/mapserver/ticket/2943Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1914
cve@mitre.orghttp://www.positronsecurity.com/advisories/2009-000.htmlExploit
cve@mitre.orghttp://www.securityfocus.com/archive/1/502271/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/34306
cve@mitre.orghttp://www.securitytracker.com/id?1021952
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/49545
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html
af854a3a-2127-422b-91ae-364da2661108http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34520
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34603
af854a3a-2127-422b-91ae-364da2661108http://trac.osgeo.org/mapserver/ticket/2943Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1914
af854a3a-2127-422b-91ae-364da2661108http://www.positronsecurity.com/advisories/2009-000.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/502271/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34306
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021952
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49545
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer underflow in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to have an unknown impact via a negative value in the Content-Length HTTP header."
    },
    {
      "lang": "es",
      "value": "Desbordamiento inferior de b\u00fafer  basado en mont\u00edculo en la funci\u00f3n readPostBody en cgiutil.c en mapserv v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2, permite a atacantes remotos tener un impacto desconocido a trav\u00e9s de un valor negativo en la cabecera HTTP Content-Length."
    }
  ],
  "id": "CVE-2009-0840",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-31T18:24:45.860",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34520"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/2943"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49545"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/2943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-0842

Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to read arbitrary invalid .map files via a full pathname in the map parameter, which triggers the display of partial file contents within an error message, as demonstrated by a /tmp/sekrut.map symlink.
References
cve@mitre.orghttp://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.htmlPatch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/34520
cve@mitre.orghttp://secunia.com/advisories/34603
cve@mitre.orghttp://trac.osgeo.org/mapserver/ticket/2941
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1914
cve@mitre.orghttp://www.positronsecurity.com/advisories/2009-000.htmlExploit
cve@mitre.orghttp://www.securityfocus.com/archive/1/502271/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/34306
cve@mitre.orghttp://www.securitytracker.com/id?1021952
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html
af854a3a-2127-422b-91ae-364da2661108http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34520
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34603
af854a3a-2127-422b-91ae-364da2661108http://trac.osgeo.org/mapserver/ticket/2941
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1914
af854a3a-2127-422b-91ae-364da2661108http://www.positronsecurity.com/advisories/2009-000.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/502271/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34306
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021952
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to read arbitrary invalid .map files via a full pathname in the map parameter, which triggers the display of partial file contents within an error message, as demonstrated by a /tmp/sekrut.map symlink."
    },
    {
      "lang": "es",
      "value": "mapserv en MapServer 4.x versiones anteriores a v4.10.4 y 5.x versiones anteriores a v5.2.2 permite a atacantes remotos leer ficheros .map inv\u00e1lidos de su elecci\u00f3n a trav\u00e9s de una ruta completa en el par\u00e1metro \"map\", lo cual dispara la pantalla del contenido de un fichero parcial dentro de un mensaje de error, como lo demostrado por un symlink /tmp/sekrut.map."
    }
  ],
  "id": "CVE-2009-0842",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-31T18:24:45.907",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34520"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.osgeo.org/mapserver/ticket/2941"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.osgeo.org/mapserver/ticket/2941"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-0841

Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when running on Windows with Cygwin, allows remote attackers to create arbitrary files via a .. (dot dot) in the id parameter.
References
cve@mitre.orghttp://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.htmlPatch
cve@mitre.orghttp://secunia.com/advisories/34520
cve@mitre.orghttp://secunia.com/advisories/34603
cve@mitre.orghttp://trac.osgeo.org/mapserver/ticket/2942Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1914
cve@mitre.orghttp://www.positronsecurity.com/advisories/2009-000.htmlExploit
cve@mitre.orghttp://www.securityfocus.com/archive/1/502271/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/34306
cve@mitre.orghttp://www.securitytracker.com/id?1021952
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/49548
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html
af854a3a-2127-422b-91ae-364da2661108http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34520
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34603
af854a3a-2127-422b-91ae-364da2661108http://trac.osgeo.org/mapserver/ticket/2942Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1914
af854a3a-2127-422b-91ae-364da2661108http://www.positronsecurity.com/advisories/2009-000.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/502271/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34306
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021952
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49548
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when running on Windows with Cygwin, allows remote attackers to create arbitrary files via a .. (dot dot) in the id parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en mapserv.c en mapserv en MapServer v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2, cuando se ejecuta sobre Windows con Cygwin, permite a atacantes remotos crear fichero de modo arbitrario a traves de ..(punto punto) en el parametro \"id\"."
    }
  ],
  "id": "CVE-2009-0841",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-31T18:24:45.877",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34520"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/2942"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49548"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://trac.osgeo.org/mapserver/ticket/2942"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.positronsecurity.com/advisories/2009-000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2013-7262 (GCVE-0-2013-7262)

Vulnerability from cvelistv5 – Published: 2014-01-05 20:00 – Updated: 2024-08-06 18:01
VLAI?
Summary
SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:01:20.304Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/mapserver/mapserver/issues/4834"
          },
          {
            "name": "64671",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/64671"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-05-12T19:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/mapserver/mapserver/issues/4834"
        },
        {
          "name": "64671",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/64671"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7262",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1",
              "refsource": "CONFIRM",
              "url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
            },
            {
              "name": "https://github.com/mapserver/mapserver/issues/4834",
              "refsource": "CONFIRM",
              "url": "https://github.com/mapserver/mapserver/issues/4834"
            },
            {
              "name": "64671",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/64671"
            },
            {
              "name": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed",
              "refsource": "CONFIRM",
              "url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7262",
    "datePublished": "2014-01-05T20:00:00",
    "dateReserved": "2014-01-05T00:00:00",
    "dateUpdated": "2024-08-06T18:01:20.304Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2975 (GCVE-0-2011-2975)

Vulnerability from cvelistv5 – Published: 2011-08-01 20:00 – Updated: 2024-09-16 22:08
VLAI?
Summary
Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:32.116Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/3939"
          },
          {
            "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-08-01T20:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/3939"
        },
        {
          "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-2975",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://trac.osgeo.org/mapserver/ticket/3939",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/ticket/3939"
            },
            {
              "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
              "refsource": "MLIST",
              "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-2975",
    "datePublished": "2011-08-01T20:00:00Z",
    "dateReserved": "2011-08-01T00:00:00Z",
    "dateUpdated": "2024-09-16T22:08:46.606Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2703 (GCVE-0-2011-2703)

Vulnerability from cvelistv5 – Published: 2011-08-01 19:00 – Updated: 2024-08-06 23:08
VLAI?
Summary
Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/45318 third-party-advisoryx_refsource_SECUNIA
http://trac.osgeo.org/mapserver/ticket/3903 x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
http://secunia.com/advisories/45257 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2011/dsa-2285 vendor-advisoryx_refsource_DEBIAN
https://bugzilla.redhat.com/show_bug.cgi?id=723293 x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
http://secunia.com/advisories/45368 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=722545 x_refsource_CONFIRM
http://lists.osgeo.org/pipermail/mapserver-users/… mailing-listx_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/48720 vdb-entryx_refsource_BID
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:08:23.731Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "45318",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45318"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/3903"
          },
          {
            "name": "[oss-security] 20110719 CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
          },
          {
            "name": "45257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45257"
          },
          {
            "name": "DSA-2285",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2285"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
          },
          {
            "name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
          },
          {
            "name": "45368",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45368"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
          },
          {
            "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
          },
          {
            "name": "mapserver-multiple-sql-injection(68682)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
          },
          {
            "name": "48720",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48720"
          },
          {
            "name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-07-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "45318",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45318"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/3903"
        },
        {
          "name": "[oss-security] 20110719 CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
        },
        {
          "name": "45257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45257"
        },
        {
          "name": "DSA-2285",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2285"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
        },
        {
          "name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
        },
        {
          "name": "45368",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45368"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
        },
        {
          "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
        },
        {
          "name": "mapserver-multiple-sql-injection(68682)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
        },
        {
          "name": "48720",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48720"
        },
        {
          "name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2703",
    "datePublished": "2011-08-01T19:00:00",
    "dateReserved": "2011-07-11T00:00:00",
    "dateUpdated": "2024-08-06T23:08:23.731Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2704 (GCVE-0-2011-2704)

Vulnerability from cvelistv5 – Published: 2011-08-01 19:00 – Updated: 2024-08-06 23:08
VLAI?
Summary
Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://trac.osgeo.org/mapserver/ticket/3903 x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/45257 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2011/dsa-2285 vendor-advisoryx_refsource_DEBIAN
https://bugzilla.redhat.com/show_bug.cgi?id=723293 x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
http://secunia.com/advisories/45368 third-party-advisoryx_refsource_SECUNIA
http://lists.osgeo.org/pipermail/mapserver-users/… mailing-listx_refsource_MLIST
http://www.securityfocus.com/bid/48720 vdb-entryx_refsource_BID
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:08:23.773Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/3903"
          },
          {
            "name": "mapserver-ogc-bo(68719)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
          },
          {
            "name": "45257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45257"
          },
          {
            "name": "DSA-2285",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2285"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
          },
          {
            "name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
          },
          {
            "name": "45368",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45368"
          },
          {
            "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
          },
          {
            "name": "48720",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48720"
          },
          {
            "name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-07-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/3903"
        },
        {
          "name": "mapserver-ogc-bo(68719)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
        },
        {
          "name": "45257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45257"
        },
        {
          "name": "DSA-2285",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2285"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
        },
        {
          "name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
        },
        {
          "name": "45368",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45368"
        },
        {
          "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
        },
        {
          "name": "48720",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48720"
        },
        {
          "name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2704",
    "datePublished": "2011-08-01T19:00:00",
    "dateReserved": "2011-07-11T00:00:00",
    "dateUpdated": "2024-08-06T23:08:23.773Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2540 (GCVE-0-2010-2540)

Vulnerability from cvelistv5 – Published: 2010-08-02 21:00 – Updated: 2024-08-07 02:39
VLAI?
Summary
mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:39:36.781Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
          },
          {
            "name": "41855",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/41855"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/3485"
          },
          {
            "name": "[oss-security] 20100721 Re: CVE id request: mapserver",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
          },
          {
            "name": "mapserver-cgi-code-execution(60852)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
          },
          {
            "name": "[oss-security] 20100721 CVE id request: mapserver",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
        },
        {
          "name": "41855",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/41855"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/3485"
        },
        {
          "name": "[oss-security] 20100721 Re: CVE id request: mapserver",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
        },
        {
          "name": "mapserver-cgi-code-execution(60852)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
        },
        {
          "name": "[oss-security] 20100721 CVE id request: mapserver",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-2540",
    "datePublished": "2010-08-02T21:00:00",
    "dateReserved": "2010-06-30T00:00:00",
    "dateUpdated": "2024-08-07T02:39:36.781Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2539 (GCVE-0-2010-2539)

Vulnerability from cvelistv5 – Published: 2010-08-02 21:00 – Updated: 2024-08-07 02:39
VLAI?
Summary
Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:39:36.689Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
          },
          {
            "name": "mapserver-mstmpfile-bo(60851)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
          },
          {
            "name": "41855",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/41855"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/3484"
          },
          {
            "name": "[oss-security] 20100721 Re: CVE id request: mapserver",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
          },
          {
            "name": "[oss-security] 20100721 CVE id request: mapserver",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
        },
        {
          "name": "mapserver-mstmpfile-bo(60851)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
        },
        {
          "name": "41855",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/41855"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/3484"
        },
        {
          "name": "[oss-security] 20100721 Re: CVE id request: mapserver",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
        },
        {
          "name": "[oss-security] 20100721 CVE id request: mapserver",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-2539",
    "datePublished": "2010-08-02T21:00:00",
    "dateReserved": "2010-06-30T00:00:00",
    "dateUpdated": "2024-08-07T02:39:36.689Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2281 (GCVE-0-2009-2281)

Vulnerability from cvelistv5 – Published: 2009-10-23 18:00 – Updated: 2024-09-16 16:23
VLAI?
Summary
Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:55.899Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
          },
          {
            "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
          },
          {
            "name": "DSA-1914",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1914"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/2943"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-10-23T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
        },
        {
          "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
        },
        {
          "name": "DSA-1914",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1914"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/2943"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2281",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
            },
            {
              "name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz",
              "refsource": "CONFIRM",
              "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
            },
            {
              "name": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
            },
            {
              "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
            },
            {
              "name": "DSA-1914",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1914"
            },
            {
              "name": "http://trac.osgeo.org/mapserver/ticket/2943",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/ticket/2943"
            },
            {
              "name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz",
              "refsource": "CONFIRM",
              "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2281",
    "datePublished": "2009-10-23T18:00:00Z",
    "dateReserved": "2009-07-01T00:00:00Z",
    "dateUpdated": "2024-09-16T16:23:42.293Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0839 (GCVE-0-2009-0839)

Vulnerability from cvelistv5 – Published: 2009-03-31 18:00 – Updated: 2024-08-07 04:48
VLAI?
Summary
Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.positronsecurity.com/advisories/2009-0… x_refsource_MISC
http://www.securitytracker.com/id?1021952 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/archive/1/502271/100… mailing-listx_refsource_BUGTRAQ
http://trac.osgeo.org/mapserver/ticket/2944 x_refsource_CONFIRM
http://secunia.com/advisories/34603 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.securityfocus.com/bid/34306 vdb-entryx_refsource_BID
http://secunia.com/advisories/34520 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1914 vendor-advisoryx_refsource_DEBIAN
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://lists.osgeo.org/pipermail/mapserver-users/… mailing-listx_refsource_MLIST
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:48:52.504Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.positronsecurity.com/advisories/2009-000.html"
          },
          {
            "name": "1021952",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021952"
          },
          {
            "name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/2944"
          },
          {
            "name": "34603",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34603"
          },
          {
            "name": "FEDORA-2009-3383",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
          },
          {
            "name": "34306",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34306"
          },
          {
            "name": "34520",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34520"
          },
          {
            "name": "DSA-1914",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1914"
          },
          {
            "name": "FEDORA-2009-3357",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
          },
          {
            "name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.positronsecurity.com/advisories/2009-000.html"
        },
        {
          "name": "1021952",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021952"
        },
        {
          "name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/2944"
        },
        {
          "name": "34603",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34603"
        },
        {
          "name": "FEDORA-2009-3383",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
        },
        {
          "name": "34306",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34306"
        },
        {
          "name": "34520",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34520"
        },
        {
          "name": "DSA-1914",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1914"
        },
        {
          "name": "FEDORA-2009-3357",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
        },
        {
          "name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0839",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.positronsecurity.com/advisories/2009-000.html",
              "refsource": "MISC",
              "url": "http://www.positronsecurity.com/advisories/2009-000.html"
            },
            {
              "name": "1021952",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021952"
            },
            {
              "name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
            },
            {
              "name": "http://trac.osgeo.org/mapserver/ticket/2944",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/ticket/2944"
            },
            {
              "name": "34603",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34603"
            },
            {
              "name": "FEDORA-2009-3383",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
            },
            {
              "name": "34306",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34306"
            },
            {
              "name": "34520",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34520"
            },
            {
              "name": "DSA-1914",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1914"
            },
            {
              "name": "FEDORA-2009-3357",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
            },
            {
              "name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
              "refsource": "MLIST",
              "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0839",
    "datePublished": "2009-03-31T18:00:00",
    "dateReserved": "2009-03-06T00:00:00",
    "dateUpdated": "2024-08-07T04:48:52.504Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-7262 (GCVE-0-2013-7262)

Vulnerability from nvd – Published: 2014-01-05 20:00 – Updated: 2024-08-06 18:01
VLAI?
Summary
SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:01:20.304Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/mapserver/mapserver/issues/4834"
          },
          {
            "name": "64671",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/64671"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-05-12T19:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/mapserver/mapserver/issues/4834"
        },
        {
          "name": "64671",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/64671"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7262",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1",
              "refsource": "CONFIRM",
              "url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
            },
            {
              "name": "https://github.com/mapserver/mapserver/issues/4834",
              "refsource": "CONFIRM",
              "url": "https://github.com/mapserver/mapserver/issues/4834"
            },
            {
              "name": "64671",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/64671"
            },
            {
              "name": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed",
              "refsource": "CONFIRM",
              "url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7262",
    "datePublished": "2014-01-05T20:00:00",
    "dateReserved": "2014-01-05T00:00:00",
    "dateUpdated": "2024-08-06T18:01:20.304Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2975 (GCVE-0-2011-2975)

Vulnerability from nvd – Published: 2011-08-01 20:00 – Updated: 2024-09-16 22:08
VLAI?
Summary
Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:32.116Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/3939"
          },
          {
            "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-08-01T20:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/3939"
        },
        {
          "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-2975",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://trac.osgeo.org/mapserver/ticket/3939",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/ticket/3939"
            },
            {
              "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
              "refsource": "MLIST",
              "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-2975",
    "datePublished": "2011-08-01T20:00:00Z",
    "dateReserved": "2011-08-01T00:00:00Z",
    "dateUpdated": "2024-09-16T22:08:46.606Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2703 (GCVE-0-2011-2703)

Vulnerability from nvd – Published: 2011-08-01 19:00 – Updated: 2024-08-06 23:08
VLAI?
Summary
Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/45318 third-party-advisoryx_refsource_SECUNIA
http://trac.osgeo.org/mapserver/ticket/3903 x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
http://secunia.com/advisories/45257 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2011/dsa-2285 vendor-advisoryx_refsource_DEBIAN
https://bugzilla.redhat.com/show_bug.cgi?id=723293 x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
http://secunia.com/advisories/45368 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=722545 x_refsource_CONFIRM
http://lists.osgeo.org/pipermail/mapserver-users/… mailing-listx_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/48720 vdb-entryx_refsource_BID
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:08:23.731Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "45318",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45318"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/3903"
          },
          {
            "name": "[oss-security] 20110719 CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
          },
          {
            "name": "45257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45257"
          },
          {
            "name": "DSA-2285",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2285"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
          },
          {
            "name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
          },
          {
            "name": "45368",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45368"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
          },
          {
            "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
          },
          {
            "name": "mapserver-multiple-sql-injection(68682)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
          },
          {
            "name": "48720",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48720"
          },
          {
            "name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-07-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "45318",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45318"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/3903"
        },
        {
          "name": "[oss-security] 20110719 CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
        },
        {
          "name": "45257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45257"
        },
        {
          "name": "DSA-2285",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2285"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
        },
        {
          "name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
        },
        {
          "name": "45368",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45368"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
        },
        {
          "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
        },
        {
          "name": "mapserver-multiple-sql-injection(68682)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
        },
        {
          "name": "48720",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48720"
        },
        {
          "name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2703",
    "datePublished": "2011-08-01T19:00:00",
    "dateReserved": "2011-07-11T00:00:00",
    "dateUpdated": "2024-08-06T23:08:23.731Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2704 (GCVE-0-2011-2704)

Vulnerability from nvd – Published: 2011-08-01 19:00 – Updated: 2024-08-06 23:08
VLAI?
Summary
Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://trac.osgeo.org/mapserver/ticket/3903 x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/45257 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2011/dsa-2285 vendor-advisoryx_refsource_DEBIAN
https://bugzilla.redhat.com/show_bug.cgi?id=723293 x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
http://secunia.com/advisories/45368 third-party-advisoryx_refsource_SECUNIA
http://lists.osgeo.org/pipermail/mapserver-users/… mailing-listx_refsource_MLIST
http://www.securityfocus.com/bid/48720 vdb-entryx_refsource_BID
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:08:23.773Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/3903"
          },
          {
            "name": "mapserver-ogc-bo(68719)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
          },
          {
            "name": "45257",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45257"
          },
          {
            "name": "DSA-2285",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2285"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
          },
          {
            "name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
          },
          {
            "name": "45368",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45368"
          },
          {
            "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
          },
          {
            "name": "48720",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48720"
          },
          {
            "name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-07-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/3903"
        },
        {
          "name": "mapserver-ogc-bo(68719)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
        },
        {
          "name": "45257",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45257"
        },
        {
          "name": "DSA-2285",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2285"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
        },
        {
          "name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
        },
        {
          "name": "45368",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45368"
        },
        {
          "name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
        },
        {
          "name": "48720",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48720"
        },
        {
          "name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2704",
    "datePublished": "2011-08-01T19:00:00",
    "dateReserved": "2011-07-11T00:00:00",
    "dateUpdated": "2024-08-06T23:08:23.773Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2540 (GCVE-0-2010-2540)

Vulnerability from nvd – Published: 2010-08-02 21:00 – Updated: 2024-08-07 02:39
VLAI?
Summary
mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:39:36.781Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
          },
          {
            "name": "41855",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/41855"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/3485"
          },
          {
            "name": "[oss-security] 20100721 Re: CVE id request: mapserver",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
          },
          {
            "name": "mapserver-cgi-code-execution(60852)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
          },
          {
            "name": "[oss-security] 20100721 CVE id request: mapserver",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
        },
        {
          "name": "41855",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/41855"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/3485"
        },
        {
          "name": "[oss-security] 20100721 Re: CVE id request: mapserver",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
        },
        {
          "name": "mapserver-cgi-code-execution(60852)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
        },
        {
          "name": "[oss-security] 20100721 CVE id request: mapserver",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-2540",
    "datePublished": "2010-08-02T21:00:00",
    "dateReserved": "2010-06-30T00:00:00",
    "dateUpdated": "2024-08-07T02:39:36.781Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2539 (GCVE-0-2010-2539)

Vulnerability from nvd – Published: 2010-08-02 21:00 – Updated: 2024-08-07 02:39
VLAI?
Summary
Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:39:36.689Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
          },
          {
            "name": "mapserver-mstmpfile-bo(60851)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
          },
          {
            "name": "41855",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/41855"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/3484"
          },
          {
            "name": "[oss-security] 20100721 Re: CVE id request: mapserver",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
          },
          {
            "name": "[oss-security] 20100721 CVE id request: mapserver",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
        },
        {
          "name": "mapserver-mstmpfile-bo(60851)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
        },
        {
          "name": "41855",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/41855"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/3484"
        },
        {
          "name": "[oss-security] 20100721 Re: CVE id request: mapserver",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
        },
        {
          "name": "[oss-security] 20100721 CVE id request: mapserver",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-2539",
    "datePublished": "2010-08-02T21:00:00",
    "dateReserved": "2010-06-30T00:00:00",
    "dateUpdated": "2024-08-07T02:39:36.689Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2281 (GCVE-0-2009-2281)

Vulnerability from nvd – Published: 2009-10-23 18:00 – Updated: 2024-09-16 16:23
VLAI?
Summary
Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:55.899Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
          },
          {
            "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
          },
          {
            "name": "DSA-1914",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1914"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/2943"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-10-23T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
        },
        {
          "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
        },
        {
          "name": "DSA-1914",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1914"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/2943"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2281",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
            },
            {
              "name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz",
              "refsource": "CONFIRM",
              "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
            },
            {
              "name": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
            },
            {
              "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
            },
            {
              "name": "DSA-1914",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1914"
            },
            {
              "name": "http://trac.osgeo.org/mapserver/ticket/2943",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/ticket/2943"
            },
            {
              "name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz",
              "refsource": "CONFIRM",
              "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2281",
    "datePublished": "2009-10-23T18:00:00Z",
    "dateReserved": "2009-07-01T00:00:00Z",
    "dateUpdated": "2024-09-16T16:23:42.293Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0839 (GCVE-0-2009-0839)

Vulnerability from nvd – Published: 2009-03-31 18:00 – Updated: 2024-08-07 04:48
VLAI?
Summary
Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.positronsecurity.com/advisories/2009-0… x_refsource_MISC
http://www.securitytracker.com/id?1021952 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/archive/1/502271/100… mailing-listx_refsource_BUGTRAQ
http://trac.osgeo.org/mapserver/ticket/2944 x_refsource_CONFIRM
http://secunia.com/advisories/34603 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.securityfocus.com/bid/34306 vdb-entryx_refsource_BID
http://secunia.com/advisories/34520 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1914 vendor-advisoryx_refsource_DEBIAN
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://lists.osgeo.org/pipermail/mapserver-users/… mailing-listx_refsource_MLIST
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:48:52.504Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.positronsecurity.com/advisories/2009-000.html"
          },
          {
            "name": "1021952",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021952"
          },
          {
            "name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/2944"
          },
          {
            "name": "34603",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34603"
          },
          {
            "name": "FEDORA-2009-3383",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
          },
          {
            "name": "34306",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34306"
          },
          {
            "name": "34520",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34520"
          },
          {
            "name": "DSA-1914",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1914"
          },
          {
            "name": "FEDORA-2009-3357",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
          },
          {
            "name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.positronsecurity.com/advisories/2009-000.html"
        },
        {
          "name": "1021952",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021952"
        },
        {
          "name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/2944"
        },
        {
          "name": "34603",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34603"
        },
        {
          "name": "FEDORA-2009-3383",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
        },
        {
          "name": "34306",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34306"
        },
        {
          "name": "34520",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34520"
        },
        {
          "name": "DSA-1914",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1914"
        },
        {
          "name": "FEDORA-2009-3357",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
        },
        {
          "name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0839",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.positronsecurity.com/advisories/2009-000.html",
              "refsource": "MISC",
              "url": "http://www.positronsecurity.com/advisories/2009-000.html"
            },
            {
              "name": "1021952",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021952"
            },
            {
              "name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
            },
            {
              "name": "http://trac.osgeo.org/mapserver/ticket/2944",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/ticket/2944"
            },
            {
              "name": "34603",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34603"
            },
            {
              "name": "FEDORA-2009-3383",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
            },
            {
              "name": "34306",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34306"
            },
            {
              "name": "34520",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34520"
            },
            {
              "name": "DSA-1914",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1914"
            },
            {
              "name": "FEDORA-2009-3357",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
            },
            {
              "name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
              "refsource": "MLIST",
              "url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0839",
    "datePublished": "2009-03-31T18:00:00",
    "dateReserved": "2009-03-06T00:00:00",
    "dateUpdated": "2024-08-07T04:48:52.504Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}