Search criteria
42 vulnerabilities found for mapserver by umn
FKIE_CVE-2013-7262
Vulnerability from fkie_nvd - Published: 2014-01-05 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B70E7C5A-FD95-433E-AFC9-125E02601C01",
"versionEndIncluding": "6.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3463E320-A38C-4D06-BE66-DB20AC9994E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C99339E6-87F2-4571-9789-4593381849AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "320F9C32-C57F-457E-9238-183FFCB633C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFE5FE6-9AFB-4C18-9B30-F13273D4B1C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "375C147D-82EF-4582-91F1-67EE0196BB5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16A7F401-1829-440B-A7D0-08515F73E11A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A01342-B989-4134-8692-8BD8A42B93D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F43392C7-AC41-47CE-80B6-4AF935535D58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6AA556-0F19-4B6B-BF83-7C04FA7224A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "14A74989-30DD-4706-835F-A26A5A214A5A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n msPostGISLayerSetTimeFilter en mappostgis.c en MapServer anterior a v6.4.1, cuando un servicio WMS-Time es utilizado permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de una cadena manipulada en un filtro PostGIS TIME."
}
],
"id": "CVE-2013-7262",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-01-05T20:55:04.147",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/64671"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/mapserver/mapserver/issues/4834"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/64671"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/mapserver/mapserver/issues/4834"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-2975
Vulnerability from fkie_nvd - Published: 2011-08-01 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8186CBBA-930C-4056-B375-DAD5DED37556",
"versionEndIncluding": "6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3463E320-A38C-4D06-BE66-DB20AC9994E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C99339E6-87F2-4571-9789-4593381849AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.10.7:*:*:*:*:*:*:*",
"matchCriteriaId": "00063772-1E7D-406F-A390-7B4FB21A6096",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "17721EF7-4B68-44F4-B38B-B1A1598ACC94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F43392C7-AC41-47CE-80B6-4AF935535D58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A8C37B7-14D9-40A8-A0EA-B92AE91E9222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EFC26637-E186-4C95-B9EA-12A96919FE25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F00721EA-2D0C-45AD-A909-450141400489",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6AA556-0F19-4B6B-BF83-7C04FA7224A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FCDF813C-781A-44E4-99EB-9716F9789A6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "6848D95B-9682-4017-86C5-91E979E27D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "F76F63E7-D36E-4061-B26C-260C6DE3934F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "88061976-D6E6-44A6-B765-32ACA74F7A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "57041185-4A72-4A74-95CB-DC902947085E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "2F8C35E8-AB54-4D24-9AE1-A1FF69E81298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "8F66DF75-3621-45DF-B0FC-5C7EB928FB4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "C816A56D-1139-4AFA-A457-966522EF6150",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D30020CA-CFAD-49B0-9340-89AB48CE60E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data."
},
{
"lang": "es",
"value": "Doble vulnerabilidad libre en la funci\u00f3n msAddImageSymbol en mapsymbol.c en MapServer anterior a v6.0.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) o tener otro impacto no especificado a trav\u00e9s de datos mapfile manipulados."
}
],
"id": "CVE-2011-2975",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-08-01T20:55:01.273",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3939"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3939"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-2704
Vulnerability from fkie_nvd - Published: 2011-08-01 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6823B0AE-FBC3-4E49-9BB4-64A39435B328",
"versionEndIncluding": "4.10.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3463E320-A38C-4D06-BE66-DB20AC9994E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C99339E6-87F2-4571-9789-4593381849AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "17721EF7-4B68-44F4-B38B-B1A1598ACC94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F43392C7-AC41-47CE-80B6-4AF935535D58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A8C37B7-14D9-40A8-A0EA-B92AE91E9222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EFC26637-E186-4C95-B9EA-12A96919FE25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F00721EA-2D0C-45AD-A909-450141400489",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en MapServer anterior a v4.10.7 y v5.x anterior a v5.6.7 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores relacionados con el filtro codificado OGC."
}
],
"id": "CVE-2011-2704",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-08-01T19:55:01.477",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45257"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45368"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/48720"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45257"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45368"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/48720"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-2703
Vulnerability from fkie_nvd - Published: 2011-08-01 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6823B0AE-FBC3-4E49-9BB4-64A39435B328",
"versionEndIncluding": "4.10.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3463E320-A38C-4D06-BE66-DB20AC9994E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C99339E6-87F2-4571-9789-4593381849AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "17721EF7-4B68-44F4-B38B-B1A1598ACC94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F43392C7-AC41-47CE-80B6-4AF935535D58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A8C37B7-14D9-40A8-A0EA-B92AE91E9222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EFC26637-E186-4C95-B9EA-12A96919FE25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:5.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F00721EA-2D0C-45AD-A909-450141400489",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "14A74989-30DD-4706-835F-A26A5A214A5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FCDF813C-781A-44E4-99EB-9716F9789A6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "6848D95B-9682-4017-86C5-91E979E27D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "F76F63E7-D36E-4061-B26C-260C6DE3934F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "88061976-D6E6-44A6-B765-32ACA74F7A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "57041185-4A72-4A74-95CB-DC902947085E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "2F8C35E8-AB54-4D24-9AE1-A1FF69E81298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "8F66DF75-3621-45DF-B0FC-5C7EB928FB4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "C816A56D-1139-4AFA-A457-966522EF6150",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:6.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D30020CA-CFAD-49B0-9340-89AB48CE60E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en MapServer anterior a v4.10.7, y v5.x anterior a v5.6.7, y v6.x anterior a v6.0.1 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de vectores relacionados con (1) filtros codificados OGC o (2) tiempo de soporte WMS."
}
],
"id": "CVE-2011-2703",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-08-01T19:55:01.427",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45257"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45318"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45368"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/48720"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45257"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45318"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45368"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/48720"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-2539
Vulnerability from fkie_nvd - Published: 2010-08-02 22:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A8F303A-608D-4654-9D47-48DFF37AE112",
"versionEndIncluding": "4.10.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "769B10FF-3175-43DB-9808-8E7712F6E6BB",
"versionEndIncluding": "5.6.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en la funci\u00f3n msTmpFile en maputil.c en mapserv en MapServer en versiones anteriores a la 4.10.6 y 5.x en versiones anteriores a la 5.6.4, permite a usuarios locales provocar una denegaci\u00f3n de servicio mediante vectores que involucran nombres de ficheros temporales."
}
],
"id": "CVE-2010-2539",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-08-02T22:00:01.247",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3484"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/41855"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3484"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/41855"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-2540
Vulnerability from fkie_nvd - Published: 2010-08-02 22:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A8F303A-608D-4654-9D47-48DFF37AE112",
"versionEndIncluding": "4.10.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "769B10FF-3175-43DB-9808-8E7712F6E6BB",
"versionEndIncluding": "5.6.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "10745BC1-9849-4C26-8CB4-7AF75323AF5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "316892DC-5B62-45D4-B37D-6C0C2E384BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DD8E01-7A50-49CF-B083-E796C56A37AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments."
},
{
"lang": "es",
"value": "mapserv.c en mapserv en MapServer en versiones anteriores a la 4.10.6 y 5.x en versiones anteriores a la 5.6.4 no restringe de manera apropiada el uso de argumentos de linea de comandos CGI que se establecieron para depuraci\u00f3n, lo que permite a atacantes remotos tener un impacto no especificado mediante argumentos manipulados."
}
],
"id": "CVE-2010-2540",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-08-02T22:00:01.297",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://trac.osgeo.org/mapserver/ticket/3485"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/41855"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://trac.osgeo.org/mapserver/ticket/3485"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/41855"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-2281
Vulnerability from fkie_nvd - Published: 2009-10-23 18:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A456E60-8073-4726-AC77-573DCA877FAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5A6832D8-7E2B-457A-ABBC-09761DD73ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "38513CAF-212E-495E-844F-09554FAC0B75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "20037250-ACD8-4425-898E-A5E857E3D159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "6173ECB3-07D7-43D7-8B0A-C524C5E9F231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "753D71D6-4535-475D-96F1-42217F9ADE22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "517783AC-5678-48B9-A3FE-BEDCE1176651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "577E45A9-D259-4DD3-803F-459640673865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamiento de b\u00fafer basados en memoria din\u00e1mica en la funci\u00f3n readPostBody en cgiutil.c de mapserv en MapServer v4.x hasta v4.10.4 y v5.x anteriores a v5.4.2, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de (1) una cabecera de HTTP \"Content-Length\" manipulada o (2) una petici\u00f3n HTTP larga, relacionado con un desbordamiento de entero que provoca una desbordamiento de b\u00fafer basado en memoria din\u00e1mica. NOTA: Esta vulnerabilidad existe por un correcci\u00f3n incompleta de CVE-2009-0840."
}
],
"id": "CVE-2009-2281",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-10-23T18:30:00.297",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
},
{
"source": "cve@mitre.org",
"url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
},
{
"source": "cve@mitre.org",
"url": "http://trac.osgeo.org/mapserver/ticket/2943"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://trac.osgeo.org/mapserver/ticket/2943"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-0839
Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| osgeo | mapserver | 4.2.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.1 | |
| osgeo | mapserver | 4.10.2 | |
| osgeo | mapserver | 4.10.3 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.1 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en mapserv.c en mapserv en MapServer v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2, cuando el servidor tiene un mapa con un atributo largo IMAGEPATH O NAME, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un par\u00e1metro \"id\" manipulado en una acci\u00f3n \"query\"."
}
],
"id": "CVE-2009-0839",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-03-31T18:24:45.827",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34520"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2944"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34520"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2944"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-0843
Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
The msLoadQuery function in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to determine the existence of arbitrary files via a full pathname in the queryfile parameter, which triggers different error messages depending on whether this pathname exists.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| osgeo | mapserver | 4.2.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.1 | |
| osgeo | mapserver | 4.10.2 | |
| osgeo | mapserver | 4.10.3 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.1 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The msLoadQuery function in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to determine the existence of arbitrary files via a full pathname in the queryfile parameter, which triggers different error messages depending on whether this pathname exists."
},
{
"lang": "es",
"value": "La funci\u00f3n msLoadQuery mapserv en MapServer v4.x y anteriores, v4.10.4 y v5.x anteriores v5.2.2, permite a atacantes remotos determinar la existencia de ficheros a trav\u00e9s de un Path completo en el par\u00e1metro queryfile, lo que provoca diferentes mensajes de error dependiendo de si existe la ruta."
}
],
"id": "CVE-2009-0843",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-03-31T18:24:45.920",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34520"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "cve@mitre.org",
"url": "http://trac.osgeo.org/mapserver/ticket/2939"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "cve@mitre.org",
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34520"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://trac.osgeo.org/mapserver/ticket/2939"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-1176
Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 does not ensure that the string holding the id parameter ends in a '\0' character, which allows remote attackers to conduct buffer-overflow attacks or have unspecified other impact via a long id parameter in a query action.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| osgeo | mapserver | 4.2.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.1 | |
| osgeo | mapserver | 4.10.2 | |
| osgeo | mapserver | 4.10.3 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.1 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 does not ensure that the string holding the id parameter ends in a \u0027\\0\u0027 character, which allows remote attackers to conduct buffer-overflow attacks or have unspecified other impact via a long id parameter in a query action."
},
{
"lang": "es",
"value": "mapserv.c en mapserv en MapServer v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2 no garantiza que la cadena que soporta el par\u00e1metro \"id\" finalice en un car\u00e1cter \u0027\\0\u0027, lo que permite a atacantes remotos dirigir un ataque de desbordamiento de b\u00fafer o tener un otro impacto sin especificar a trav\u00e9s de un par\u00e1metro \"id\" largo en una acci\u00f3n de consulta."
}
],
"id": "CVE-2009-1176",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-03-31T18:24:45.967",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-1177
Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in maptemplate.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 have unknown impact and remote attack vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| osgeo | mapserver | 4.2.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.1 | |
| osgeo | mapserver | 4.10.2 | |
| osgeo | mapserver | 4.10.3 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.1 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in maptemplate.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 have unknown impact and remote attack vectors."
},
{
"lang": "es",
"value": "Desbordamiento m\u00faltiple de b\u00fafer basado en pila en el archivo maptemplate.c en mapserv en MapServer v4.x anteriores a v4.10.4 y v5.x anteriores a v5.2.2 con impacto desconocido y vectores de ataque remoto."
}
],
"id": "CVE-2009-1177",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-03-31T18:24:45.983",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "cve@mitre.org",
"url": "http://trac.osgeo.org/mapserver/ticket/2944"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://trac.osgeo.org/mapserver/ticket/2944"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-0840
Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
Heap-based buffer underflow in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to have an unknown impact via a negative value in the Content-Length HTTP header.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| osgeo | mapserver | 4.2.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.1 | |
| osgeo | mapserver | 4.10.2 | |
| osgeo | mapserver | 4.10.3 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.1 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer underflow in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to have an unknown impact via a negative value in the Content-Length HTTP header."
},
{
"lang": "es",
"value": "Desbordamiento inferior de b\u00fafer basado en mont\u00edculo en la funci\u00f3n readPostBody en cgiutil.c en mapserv v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2, permite a atacantes remotos tener un impacto desconocido a trav\u00e9s de un valor negativo en la cabecera HTTP Content-Length."
}
],
"id": "CVE-2009-0840",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-03-31T18:24:45.860",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34520"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2943"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49545"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34520"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2943"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49545"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-0842
Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to read arbitrary invalid .map files via a full pathname in the map parameter, which triggers the display of partial file contents within an error message, as demonstrated by a /tmp/sekrut.map symlink.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| osgeo | mapserver | 4.2.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.1 | |
| osgeo | mapserver | 4.10.2 | |
| osgeo | mapserver | 4.10.3 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.1 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to read arbitrary invalid .map files via a full pathname in the map parameter, which triggers the display of partial file contents within an error message, as demonstrated by a /tmp/sekrut.map symlink."
},
{
"lang": "es",
"value": "mapserv en MapServer 4.x versiones anteriores a v4.10.4 y 5.x versiones anteriores a v5.2.2 permite a atacantes remotos leer ficheros .map inv\u00e1lidos de su elecci\u00f3n a trav\u00e9s de una ruta completa en el par\u00e1metro \"map\", lo cual dispara la pantalla del contenido de un fichero parcial dentro de un mensaje de error, como lo demostrado por un symlink /tmp/sekrut.map."
}
],
"id": "CVE-2009-0842",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-03-31T18:24:45.907",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34520"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "cve@mitre.org",
"url": "http://trac.osgeo.org/mapserver/ticket/2941"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34520"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://trac.osgeo.org/mapserver/ticket/2941"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-0841
Vulnerability from fkie_nvd - Published: 2009-03-31 18:24 - Updated: 2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when running on Windows with Cygwin, allows remote attackers to create arbitrary files via a .. (dot dot) in the id parameter.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| osgeo | mapserver | 4.2.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.4.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.6.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.8.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.0 | |
| osgeo | mapserver | 4.10.1 | |
| osgeo | mapserver | 4.10.2 | |
| osgeo | mapserver | 4.10.3 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.0.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.0 | |
| osgeo | mapserver | 5.2.1 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 | |
| umn | mapserver | 4.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7362D32E-07AF-4DFB-A7EE-B92A2949FCC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16812C55-8E9F-4035-92E6-D2C7AF4F5B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5C11F257-809F-4F7C-B5B1-5D407B983DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3AFFE501-B4E0-4352-8C8D-44531E8A6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE55464C-FD27-47BF-9941-26EE7968BF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E01A6111-3A73-4033-8333-4929A6A22CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CE4F9152-4BA9-4742-9041-9707BB4B505F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F27BB1D-165E-4414-AB9B-5BBDF4268F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9305883D-8626-448C-8B1A-074158F518DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "04D30449-7EEB-42C4-9F11-4E6EE39C18F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DE53FF73-329B-4384-B636-2F4050778FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B52B92DB-535F-45B7-AF32-B97216A4C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C410FF2E-E1C6-4238-94ED-3EC6389C961D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "279DE3C1-7BEB-43A4-A91B-06D3A53C30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "279EDC4E-87CC-48ED-B735-84F96DC5796E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "53AB964F-61BD-4EC5-8469-7DB371154455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C27C5F5A-6B68-4723-809B-C482238F9647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "43CFB610-77A2-436E-ADD0-C0D647AF56DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E86BD-2358-46D5-BBB5-147168001578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6257B30-61DC-4838-92E6-D9938224BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C661B582-E2F6-4E91-A47C-E91CCB0ECF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7E60110D-1CED-47BE-8565-FE858BEFF44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8B061F26-EF3F-48CC-A974-5B49A622C5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "0870B801-E121-47D8-9C88-B01C7AB6ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B0F320C0-1A33-4768-9BB1-09C6554A9C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "81C28558-F40D-48B9-B98C-F30709C89AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "65E266D2-C1F2-4400-9E41-AEB2F116C733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9161B916-5EED-46C4-8E0C-515A0B6D2902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9689CB4-A70C-42D7-91E0-68057D9D4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6767A7E5-7A2C-452D-A6EB-9C61B43DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "119B427D-87AC-4DD8-AD13-B8CFC847A947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "57221C0B-EE09-4EB6-AE21-3C31393EB922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "74EEC8BC-A00F-4DCF-B787-5B95699DBD80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D9030BE8-663A-4F46-B255-0AEBFD790DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DED21A-FA34-4F6A-8ED5-A985671E5653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "203F6A08-17BF-4F82-82C5-E0653C2100F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E939104D-9765-4DBF-AA1D-97EBBE515972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "93188DA2-4137-4291-9FDC-469D933C9602",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when running on Windows with Cygwin, allows remote attackers to create arbitrary files via a .. (dot dot) in the id parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en mapserv.c en mapserv en MapServer v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2, cuando se ejecuta sobre Windows con Cygwin, permite a atacantes remotos crear fichero de modo arbitrario a traves de ..(punto punto) en el parametro \"id\"."
}
],
"id": "CVE-2009-0841",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-03-31T18:24:45.877",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34520"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2942"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49548"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34520"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2942"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49548"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2013-7262 (GCVE-0-2013-7262)
Vulnerability from cvelistv5 – Published: 2014-01-05 20:00 – Updated: 2024-08-06 18:01
VLAI?
Summary
SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:01:20.304Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/mapserver/mapserver/issues/4834"
},
{
"name": "64671",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/64671"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-12-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-05-12T19:57:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/mapserver/mapserver/issues/4834"
},
{
"name": "64671",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/64671"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7262",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1",
"refsource": "CONFIRM",
"url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
},
{
"name": "https://github.com/mapserver/mapserver/issues/4834",
"refsource": "CONFIRM",
"url": "https://github.com/mapserver/mapserver/issues/4834"
},
{
"name": "64671",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64671"
},
{
"name": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed",
"refsource": "CONFIRM",
"url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-7262",
"datePublished": "2014-01-05T20:00:00",
"dateReserved": "2014-01-05T00:00:00",
"dateUpdated": "2024-08-06T18:01:20.304Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-2975 (GCVE-0-2011-2975)
Vulnerability from cvelistv5 – Published: 2011-08-01 20:00 – Updated: 2024-09-16 22:08
VLAI?
Summary
Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:15:32.116Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3939"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-08-01T20:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3939"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2975",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://trac.osgeo.org/mapserver/ticket/3939",
"refsource": "CONFIRM",
"url": "http://trac.osgeo.org/mapserver/ticket/3939"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"refsource": "MLIST",
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-2975",
"datePublished": "2011-08-01T20:00:00Z",
"dateReserved": "2011-08-01T00:00:00Z",
"dateUpdated": "2024-09-16T22:08:46.606Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-2703 (GCVE-0-2011-2703)
Vulnerability from cvelistv5 – Published: 2011-08-01 19:00 – Updated: 2024-08-06 23:08
VLAI?
Summary
Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:08:23.731Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "45318",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45318"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
},
{
"name": "45257",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45257"
},
{
"name": "DSA-2285",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"name": "45368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45368"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"name": "mapserver-multiple-sql-injection(68682)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
},
{
"name": "48720",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48720"
},
{
"name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-07-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "45318",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45318"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
},
{
"name": "45257",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45257"
},
{
"name": "DSA-2285",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"name": "45368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45368"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"name": "mapserver-multiple-sql-injection(68682)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
},
{
"name": "48720",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48720"
},
{
"name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-2703",
"datePublished": "2011-08-01T19:00:00",
"dateReserved": "2011-07-11T00:00:00",
"dateUpdated": "2024-08-06T23:08:23.731Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-2704 (GCVE-0-2011-2704)
Vulnerability from cvelistv5 – Published: 2011-08-01 19:00 – Updated: 2024-08-06 23:08
VLAI?
Summary
Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:08:23.773Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"name": "mapserver-ogc-bo(68719)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
},
{
"name": "45257",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45257"
},
{
"name": "DSA-2285",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"name": "45368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45368"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"name": "48720",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48720"
},
{
"name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-07-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"name": "mapserver-ogc-bo(68719)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
},
{
"name": "45257",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45257"
},
{
"name": "DSA-2285",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"name": "45368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45368"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"name": "48720",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48720"
},
{
"name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-2704",
"datePublished": "2011-08-01T19:00:00",
"dateReserved": "2011-07-11T00:00:00",
"dateUpdated": "2024-08-06T23:08:23.773Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-2540 (GCVE-0-2010-2540)
Vulnerability from cvelistv5 – Published: 2010-08-02 21:00 – Updated: 2024-08-07 02:39
VLAI?
Summary
mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:39:36.781Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"name": "41855",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/41855"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3485"
},
{
"name": "[oss-security] 20100721 Re: CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"name": "mapserver-cgi-code-execution(60852)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
},
{
"name": "[oss-security] 20100721 CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-07-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"name": "41855",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/41855"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3485"
},
{
"name": "[oss-security] 20100721 Re: CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"name": "mapserver-cgi-code-execution(60852)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
},
{
"name": "[oss-security] 20100721 CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-2540",
"datePublished": "2010-08-02T21:00:00",
"dateReserved": "2010-06-30T00:00:00",
"dateUpdated": "2024-08-07T02:39:36.781Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-2539 (GCVE-0-2010-2539)
Vulnerability from cvelistv5 – Published: 2010-08-02 21:00 – Updated: 2024-08-07 02:39
VLAI?
Summary
Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:39:36.689Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"name": "mapserver-mstmpfile-bo(60851)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
},
{
"name": "41855",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/41855"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3484"
},
{
"name": "[oss-security] 20100721 Re: CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"name": "[oss-security] 20100721 CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-07-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"name": "mapserver-mstmpfile-bo(60851)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
},
{
"name": "41855",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/41855"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3484"
},
{
"name": "[oss-security] 20100721 Re: CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"name": "[oss-security] 20100721 CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-2539",
"datePublished": "2010-08-02T21:00:00",
"dateReserved": "2010-06-30T00:00:00",
"dateUpdated": "2024-08-07T02:39:36.689Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-2281 (GCVE-0-2009-2281)
Vulnerability from cvelistv5 – Published: 2009-10-23 18:00 – Updated: 2024-09-16 16:23
VLAI?
Summary
Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:44:55.899Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
},
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
},
{
"name": "DSA-1914",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2943"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-10-23T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
},
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
},
{
"name": "DSA-1914",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2943"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-2281",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
},
{
"name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz",
"refsource": "CONFIRM",
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
},
{
"name": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT",
"refsource": "CONFIRM",
"url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
},
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
},
{
"name": "DSA-1914",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"name": "http://trac.osgeo.org/mapserver/ticket/2943",
"refsource": "CONFIRM",
"url": "http://trac.osgeo.org/mapserver/ticket/2943"
},
{
"name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz",
"refsource": "CONFIRM",
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-2281",
"datePublished": "2009-10-23T18:00:00Z",
"dateReserved": "2009-07-01T00:00:00Z",
"dateUpdated": "2024-09-16T16:23:42.293Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0839 (GCVE-0-2009-0839)
Vulnerability from cvelistv5 – Published: 2009-03-31 18:00 – Updated: 2024-08-07 04:48
VLAI?
Summary
Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:48:52.504Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"name": "1021952",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1021952"
},
{
"name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2944"
},
{
"name": "34603",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34603"
},
{
"name": "FEDORA-2009-3383",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"name": "34306",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34306"
},
{
"name": "34520",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34520"
},
{
"name": "DSA-1914",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"name": "FEDORA-2009-3357",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"name": "1021952",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1021952"
},
{
"name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2944"
},
{
"name": "34603",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34603"
},
{
"name": "FEDORA-2009-3383",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"name": "34306",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34306"
},
{
"name": "34520",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34520"
},
{
"name": "DSA-1914",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"name": "FEDORA-2009-3357",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0839",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.positronsecurity.com/advisories/2009-000.html",
"refsource": "MISC",
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"name": "1021952",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"name": "http://trac.osgeo.org/mapserver/ticket/2944",
"refsource": "CONFIRM",
"url": "http://trac.osgeo.org/mapserver/ticket/2944"
},
{
"name": "34603",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34603"
},
{
"name": "FEDORA-2009-3383",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"name": "34306",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"name": "34520",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34520"
},
{
"name": "DSA-1914",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"name": "FEDORA-2009-3357",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
"refsource": "MLIST",
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-0839",
"datePublished": "2009-03-31T18:00:00",
"dateReserved": "2009-03-06T00:00:00",
"dateUpdated": "2024-08-07T04:48:52.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-7262 (GCVE-0-2013-7262)
Vulnerability from nvd – Published: 2014-01-05 20:00 – Updated: 2024-08-06 18:01
VLAI?
Summary
SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:01:20.304Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/mapserver/mapserver/issues/4834"
},
{
"name": "64671",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/64671"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-12-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-05-12T19:57:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/mapserver/mapserver/issues/4834"
},
{
"name": "64671",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/64671"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7262",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in the msPostGISLayerSetTimeFilter function in mappostgis.c in MapServer before 6.4.1, when a WMS-Time service is used, allows remote attackers to execute arbitrary SQL commands via a crafted string in a PostGIS TIME filter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1",
"refsource": "CONFIRM",
"url": "http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-1"
},
{
"name": "https://github.com/mapserver/mapserver/issues/4834",
"refsource": "CONFIRM",
"url": "https://github.com/mapserver/mapserver/issues/4834"
},
{
"name": "64671",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64671"
},
{
"name": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed",
"refsource": "CONFIRM",
"url": "https://github.com/mapserver/mapserver/commit/3a10f6b829297dae63492a8c63385044bc6953ed"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-7262",
"datePublished": "2014-01-05T20:00:00",
"dateReserved": "2014-01-05T00:00:00",
"dateUpdated": "2024-08-06T18:01:20.304Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-2975 (GCVE-0-2011-2975)
Vulnerability from nvd – Published: 2011-08-01 20:00 – Updated: 2024-09-16 22:08
VLAI?
Summary
Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:15:32.116Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3939"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-08-01T20:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3939"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2975",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Double free vulnerability in the msAddImageSymbol function in mapsymbol.c in MapServer before 6.0.1 might allow remote attackers to cause a denial of service (application crash) or have unspecified other impact via crafted mapfile data."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://trac.osgeo.org/mapserver/ticket/3939",
"refsource": "CONFIRM",
"url": "http://trac.osgeo.org/mapserver/ticket/3939"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"refsource": "MLIST",
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-2975",
"datePublished": "2011-08-01T20:00:00Z",
"dateReserved": "2011-08-01T00:00:00Z",
"dateUpdated": "2024-09-16T22:08:46.606Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-2703 (GCVE-0-2011-2703)
Vulnerability from nvd – Published: 2011-08-01 19:00 – Updated: 2024-08-06 23:08
VLAI?
Summary
Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:08:23.731Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "45318",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45318"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
},
{
"name": "45257",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45257"
},
{
"name": "DSA-2285",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"name": "45368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45368"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"name": "mapserver-multiple-sql-injection(68682)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
},
{
"name": "48720",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48720"
},
{
"name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-07-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in MapServer before 4.10.7, 5.x before 5.6.7, and 6.x before 6.0.1 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) OGC filter encoding or (2) WMS time support."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "45318",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45318"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/11"
},
{
"name": "45257",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45257"
},
{
"name": "DSA-2285",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"name": "45368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45368"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722545"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"name": "mapserver-multiple-sql-injection(68682)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68682"
},
{
"name": "48720",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48720"
},
{
"name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-2703",
"datePublished": "2011-08-01T19:00:00",
"dateReserved": "2011-07-11T00:00:00",
"dateUpdated": "2024-08-06T23:08:23.731Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-2704 (GCVE-0-2011-2704)
Vulnerability from nvd – Published: 2011-08-01 19:00 – Updated: 2024-08-06 23:08
VLAI?
Summary
Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:08:23.773Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"name": "mapserver-ogc-bo(68719)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
},
{
"name": "45257",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45257"
},
{
"name": "DSA-2285",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"name": "45368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45368"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"name": "48720",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48720"
},
{
"name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-07-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in MapServer before 4.10.7 and 5.x before 5.6.7 allows remote attackers to execute arbitrary code via vectors related to OGC filter encoding."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3903"
},
{
"name": "mapserver-ogc-bo(68719)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68719"
},
{
"name": "45257",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45257"
},
{
"name": "DSA-2285",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2285"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723293"
},
{
"name": "[oss-security] 20110719 CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/14"
},
{
"name": "45368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45368"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"name": "48720",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48720"
},
{
"name": "[oss-security] 20110720 Re: CVE Request -- MapServer -- Stack based buffer overflow [was: Re: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.]",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/15"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-2704",
"datePublished": "2011-08-01T19:00:00",
"dateReserved": "2011-07-11T00:00:00",
"dateUpdated": "2024-08-06T23:08:23.773Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-2540 (GCVE-0-2010-2540)
Vulnerability from nvd – Published: 2010-08-02 21:00 – Updated: 2024-08-07 02:39
VLAI?
Summary
mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:39:36.781Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"name": "41855",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/41855"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3485"
},
{
"name": "[oss-security] 20100721 Re: CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"name": "mapserver-cgi-code-execution(60852)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
},
{
"name": "[oss-security] 20100721 CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-07-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "mapserv.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 does not properly restrict the use of CGI command-line arguments that were intended for debugging, which allows remote attackers to have an unspecified impact via crafted arguments."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"name": "41855",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/41855"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3485"
},
{
"name": "[oss-security] 20100721 Re: CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"name": "mapserver-cgi-code-execution(60852)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60852"
},
{
"name": "[oss-security] 20100721 CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-2540",
"datePublished": "2010-08-02T21:00:00",
"dateReserved": "2010-06-30T00:00:00",
"dateUpdated": "2024-08-07T02:39:36.781Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-2539 (GCVE-0-2010-2539)
Vulnerability from nvd – Published: 2010-08-02 21:00 – Updated: 2024-08-07 02:39
VLAI?
Summary
Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:39:36.689Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"name": "mapserver-mstmpfile-bo(60851)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
},
{
"name": "41855",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/41855"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3484"
},
{
"name": "[oss-security] 20100721 Re: CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"name": "[oss-security] 20100721 CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-07-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[mapserver-users] 20100709 MapServer 5.6.4 and 4.10.6 released with important security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2010-July/066052.html"
},
{
"name": "mapserver-mstmpfile-bo(60851)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60851"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=617312"
},
{
"name": "41855",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/41855"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/3484"
},
{
"name": "[oss-security] 20100721 Re: CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973754121922\u0026w=2"
},
{
"name": "[oss-security] 20100721 CVE id request: mapserver",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=127973381215859\u0026w=2"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-2539",
"datePublished": "2010-08-02T21:00:00",
"dateReserved": "2010-06-30T00:00:00",
"dateUpdated": "2024-08-07T02:39:36.689Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-2281 (GCVE-0-2009-2281)
Vulnerability from nvd – Published: 2009-10-23 18:00 – Updated: 2024-09-16 16:23
VLAI?
Summary
Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:44:55.899Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
},
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
},
{
"name": "DSA-1914",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2943"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-10-23T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
},
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
},
{
"name": "DSA-1914",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2943"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-2281",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
},
{
"name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz",
"refsource": "CONFIRM",
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
},
{
"name": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT",
"refsource": "CONFIRM",
"url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
},
{
"name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
},
{
"name": "DSA-1914",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"name": "http://trac.osgeo.org/mapserver/ticket/2943",
"refsource": "CONFIRM",
"url": "http://trac.osgeo.org/mapserver/ticket/2943"
},
{
"name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz",
"refsource": "CONFIRM",
"url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-2281",
"datePublished": "2009-10-23T18:00:00Z",
"dateReserved": "2009-07-01T00:00:00Z",
"dateUpdated": "2024-09-16T16:23:42.293Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0839 (GCVE-0-2009-0839)
Vulnerability from nvd – Published: 2009-03-31 18:00 – Updated: 2024-08-07 04:48
VLAI?
Summary
Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:48:52.504Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"name": "1021952",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1021952"
},
{
"name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2944"
},
{
"name": "34603",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34603"
},
{
"name": "FEDORA-2009-3383",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"name": "34306",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34306"
},
{
"name": "34520",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34520"
},
{
"name": "DSA-1914",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"name": "FEDORA-2009-3357",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"name": "1021952",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1021952"
},
{
"name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://trac.osgeo.org/mapserver/ticket/2944"
},
{
"name": "34603",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34603"
},
{
"name": "FEDORA-2009-3383",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"name": "34306",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34306"
},
{
"name": "34520",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34520"
},
{
"name": "DSA-1914",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"name": "FEDORA-2009-3357",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0839",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.positronsecurity.com/advisories/2009-000.html",
"refsource": "MISC",
"url": "http://www.positronsecurity.com/advisories/2009-000.html"
},
{
"name": "1021952",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021952"
},
{
"name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
},
{
"name": "http://trac.osgeo.org/mapserver/ticket/2944",
"refsource": "CONFIRM",
"url": "http://trac.osgeo.org/mapserver/ticket/2944"
},
{
"name": "34603",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34603"
},
{
"name": "FEDORA-2009-3383",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html"
},
{
"name": "34306",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34306"
},
{
"name": "34520",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34520"
},
{
"name": "DSA-1914",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1914"
},
{
"name": "FEDORA-2009-3357",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
},
{
"name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
"refsource": "MLIST",
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-0839",
"datePublished": "2009-03-31T18:00:00",
"dateReserved": "2009-03-06T00:00:00",
"dateUpdated": "2024-08-07T04:48:52.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}