Search criteria

6 vulnerabilities found for mapserver by university_of_minnesota

FKIE_CVE-2007-4629

Vulnerability from fkie_nvd - Published: 2007-08-31 01:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name.
References
cve@mitre.orghttp://mapserver.gis.umn.edu/download/current/HISTORY.TXT/Patch
cve@mitre.orghttp://secunia.com/advisories/26561
cve@mitre.orghttp://secunia.com/advisories/26718
cve@mitre.orghttp://secunia.com/advisories/29688
cve@mitre.orghttp://securityreason.com/securityalert/3082
cve@mitre.orghttp://trac.osgeo.org/mapserver/ticket/2252
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1539
cve@mitre.orghttp://www.securityfocus.com/bid/25582
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2974
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=272081
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html
af854a3a-2127-422b-91ae-364da2661108http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26561
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26718
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29688
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3082
af854a3a-2127-422b-91ae-364da2661108http://trac.osgeo.org/mapserver/ticket/2252
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1539
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25582
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2974
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=272081
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html
Impacted products
Vendor Product Version
university_of_minnesota mapserver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:university_of_minnesota:mapserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "335FF88D-9CCD-4B89-888A-4DCEFC9CA4F1",
              "versionEndIncluding": "4.10.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name."
    },
    {
      "lang": "es",
      "value": "Desbordamiento del buffer en la funci\u00f3n processLine en maptemplate.c en MapServer en versiones anteriores a 4.10.3 permite a atacantes remotos provocar una ca\u00edda de servicio y posiblemente ejecutar un c\u00f3digo arbitrario a trav\u00e9s de un mapfile con un nombre largo de capa, nombre de grupo o nombre de entrada metadata largos."
    }
  ],
  "id": "CVE-2007-4629",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-08-31T01:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26561"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26718"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29688"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3082"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.osgeo.org/mapserver/ticket/2252"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1539"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/25582"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2974"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=272081"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26561"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26718"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29688"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.osgeo.org/mapserver/ticket/2252"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1539"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=272081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-4542

Vulnerability from fkie_nvd - Published: 2007-08-27 21:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in MapServer before 4.10.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the (1) processLine function in maptemplate.c and the (2) writeError function in mapserv.c in the mapserv CGI program.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346
cve@mitre.orghttp://mapserver.gis.umn.edu/download/current/HISTORY.TXT/
cve@mitre.orghttp://secunia.com/advisories/26561Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26718
cve@mitre.orghttp://secunia.com/advisories/29688
cve@mitre.orghttp://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch
cve@mitre.orghttp://trac.osgeo.org/mapserver/ticket/2256
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1539
cve@mitre.orghttp://www.securityfocus.com/bid/25582
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2974
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346
af854a3a-2127-422b-91ae-364da2661108http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26561Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26718
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29688
af854a3a-2127-422b-91ae-364da2661108http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch
af854a3a-2127-422b-91ae-364da2661108http://trac.osgeo.org/mapserver/ticket/2256
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1539
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25582
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2974
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html
Impacted products
Vendor Product Version
university_of_minnesota mapserver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:university_of_minnesota:mapserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "768F28E2-0937-4718-8128-EA1F055C4BCF",
              "versionEndIncluding": "4.10.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in MapServer before 4.10.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the (1) processLine function in maptemplate.c and the (2) writeError function in mapserv.c in the mapserv CGI program."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en MapServer anterior a 4.10.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados afectando a la funci\u00f3n (1) processLine en maptemplate.c y la funci\u00f3n (2) writeError en mapserv.c en el programa mapserv CGI."
    }
  ],
  "id": "CVE-2007-4542",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-08-27T21:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26561"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26718"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29688"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.osgeo.org/mapserver/ticket/2256"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1539"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/25582"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2974"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26561"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26718"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29688"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.osgeo.org/mapserver/ticket/2256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1539"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2007-4629 (GCVE-0-2007-4629)

Vulnerability from cvelistv5 – Published: 2007-08-31 01:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://trac.osgeo.org/mapserver/ticket/2252 x_refsource_CONFIRM
http://secunia.com/advisories/29688 third-party-advisoryx_refsource_SECUNIA
http://mapserver.gis.umn.edu/download/current/HIS… x_refsource_CONFIRM
http://securityreason.com/securityalert/3082 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/26561 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/26718 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.vupen.com/english/advisories/2007/2974 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/25582 vdb-entryx_refsource_BID
https://bugzilla.redhat.com/show_bug.cgi?id=272081 x_refsource_MISC
http://www.debian.org/security/2008/dsa-1539 vendor-advisoryx_refsource_DEBIAN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.881Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/2252"
          },
          {
            "name": "29688",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29688"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
          },
          {
            "name": "3082",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3082"
          },
          {
            "name": "26561",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26561"
          },
          {
            "name": "26718",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26718"
          },
          {
            "name": "FEDORA-2007-2018",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
          },
          {
            "name": "ADV-2007-2974",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2974"
          },
          {
            "name": "25582",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25582"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=272081"
          },
          {
            "name": "DSA-1539",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1539"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-06-10T11:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/2252"
        },
        {
          "name": "29688",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29688"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
        },
        {
          "name": "3082",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3082"
        },
        {
          "name": "26561",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26561"
        },
        {
          "name": "26718",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26718"
        },
        {
          "name": "FEDORA-2007-2018",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
        },
        {
          "name": "ADV-2007-2974",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2974"
        },
        {
          "name": "25582",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25582"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=272081"
        },
        {
          "name": "DSA-1539",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1539"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4629",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://trac.osgeo.org/mapserver/ticket/2252",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/ticket/2252"
            },
            {
              "name": "29688",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29688"
            },
            {
              "name": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/",
              "refsource": "CONFIRM",
              "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
            },
            {
              "name": "3082",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3082"
            },
            {
              "name": "26561",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26561"
            },
            {
              "name": "26718",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26718"
            },
            {
              "name": "FEDORA-2007-2018",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
            },
            {
              "name": "ADV-2007-2974",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2974"
            },
            {
              "name": "25582",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25582"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=272081",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=272081"
            },
            {
              "name": "DSA-1539",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1539"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4629",
    "datePublished": "2007-08-31T01:00:00",
    "dateReserved": "2007-08-30T00:00:00",
    "dateUpdated": "2024-08-07T15:01:09.881Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4542 (GCVE-0-2007-4542)

Vulnerability from cvelistv5 – Published: 2007-08-27 21:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in MapServer before 4.10.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the (1) processLine function in maptemplate.c and the (2) writeError function in mapserv.c in the mapserv CGI program.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.799Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch"
          },
          {
            "name": "29688",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29688"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/2256"
          },
          {
            "name": "26561",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26561"
          },
          {
            "name": "26718",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26718"
          },
          {
            "name": "FEDORA-2007-2018",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
          },
          {
            "name": "ADV-2007-2974",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2974"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346"
          },
          {
            "name": "25582",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25582"
          },
          {
            "name": "DSA-1539",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1539"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in MapServer before 4.10.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the (1) processLine function in maptemplate.c and the (2) writeError function in mapserv.c in the mapserv CGI program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-04-17T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch"
        },
        {
          "name": "29688",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29688"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/2256"
        },
        {
          "name": "26561",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26561"
        },
        {
          "name": "26718",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26718"
        },
        {
          "name": "FEDORA-2007-2018",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
        },
        {
          "name": "ADV-2007-2974",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2974"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346"
        },
        {
          "name": "25582",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25582"
        },
        {
          "name": "DSA-1539",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1539"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4542",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in MapServer before 4.10.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the (1) processLine function in maptemplate.c and the (2) writeError function in mapserv.c in the mapserv CGI program."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch",
              "refsource": "MISC",
              "url": "http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch"
            },
            {
              "name": "29688",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29688"
            },
            {
              "name": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/",
              "refsource": "CONFIRM",
              "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
            },
            {
              "name": "http://trac.osgeo.org/mapserver/ticket/2256",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/ticket/2256"
            },
            {
              "name": "26561",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26561"
            },
            {
              "name": "26718",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26718"
            },
            {
              "name": "FEDORA-2007-2018",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
            },
            {
              "name": "ADV-2007-2974",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2974"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346",
              "refsource": "MISC",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346"
            },
            {
              "name": "25582",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25582"
            },
            {
              "name": "DSA-1539",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1539"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4542",
    "datePublished": "2007-08-27T21:00:00",
    "dateReserved": "2007-08-27T00:00:00",
    "dateUpdated": "2024-08-07T15:01:09.799Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4629 (GCVE-0-2007-4629)

Vulnerability from nvd – Published: 2007-08-31 01:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://trac.osgeo.org/mapserver/ticket/2252 x_refsource_CONFIRM
http://secunia.com/advisories/29688 third-party-advisoryx_refsource_SECUNIA
http://mapserver.gis.umn.edu/download/current/HIS… x_refsource_CONFIRM
http://securityreason.com/securityalert/3082 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/26561 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/26718 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.vupen.com/english/advisories/2007/2974 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/25582 vdb-entryx_refsource_BID
https://bugzilla.redhat.com/show_bug.cgi?id=272081 x_refsource_MISC
http://www.debian.org/security/2008/dsa-1539 vendor-advisoryx_refsource_DEBIAN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.881Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/2252"
          },
          {
            "name": "29688",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29688"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
          },
          {
            "name": "3082",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3082"
          },
          {
            "name": "26561",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26561"
          },
          {
            "name": "26718",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26718"
          },
          {
            "name": "FEDORA-2007-2018",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
          },
          {
            "name": "ADV-2007-2974",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2974"
          },
          {
            "name": "25582",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25582"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=272081"
          },
          {
            "name": "DSA-1539",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1539"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-06-10T11:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/2252"
        },
        {
          "name": "29688",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29688"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
        },
        {
          "name": "3082",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3082"
        },
        {
          "name": "26561",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26561"
        },
        {
          "name": "26718",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26718"
        },
        {
          "name": "FEDORA-2007-2018",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
        },
        {
          "name": "ADV-2007-2974",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2974"
        },
        {
          "name": "25582",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25582"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=272081"
        },
        {
          "name": "DSA-1539",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1539"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4629",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://trac.osgeo.org/mapserver/ticket/2252",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/ticket/2252"
            },
            {
              "name": "29688",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29688"
            },
            {
              "name": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/",
              "refsource": "CONFIRM",
              "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
            },
            {
              "name": "3082",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3082"
            },
            {
              "name": "26561",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26561"
            },
            {
              "name": "26718",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26718"
            },
            {
              "name": "FEDORA-2007-2018",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
            },
            {
              "name": "ADV-2007-2974",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2974"
            },
            {
              "name": "25582",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25582"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=272081",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=272081"
            },
            {
              "name": "DSA-1539",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1539"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4629",
    "datePublished": "2007-08-31T01:00:00",
    "dateReserved": "2007-08-30T00:00:00",
    "dateUpdated": "2024-08-07T15:01:09.881Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4542 (GCVE-0-2007-4542)

Vulnerability from nvd – Published: 2007-08-27 21:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in MapServer before 4.10.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the (1) processLine function in maptemplate.c and the (2) writeError function in mapserv.c in the mapserv CGI program.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.799Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch"
          },
          {
            "name": "29688",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29688"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/2256"
          },
          {
            "name": "26561",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26561"
          },
          {
            "name": "26718",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26718"
          },
          {
            "name": "FEDORA-2007-2018",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
          },
          {
            "name": "ADV-2007-2974",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2974"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346"
          },
          {
            "name": "25582",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25582"
          },
          {
            "name": "DSA-1539",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1539"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in MapServer before 4.10.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the (1) processLine function in maptemplate.c and the (2) writeError function in mapserv.c in the mapserv CGI program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-04-17T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch"
        },
        {
          "name": "29688",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29688"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/2256"
        },
        {
          "name": "26561",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26561"
        },
        {
          "name": "26718",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26718"
        },
        {
          "name": "FEDORA-2007-2018",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
        },
        {
          "name": "ADV-2007-2974",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2974"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346"
        },
        {
          "name": "25582",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25582"
        },
        {
          "name": "DSA-1539",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1539"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4542",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in MapServer before 4.10.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the (1) processLine function in maptemplate.c and the (2) writeError function in mapserv.c in the mapserv CGI program."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch",
              "refsource": "MISC",
              "url": "http://trac.osgeo.org/mapserver/attachment/ticket/2256/ms-bug-2256-4.8.patch"
            },
            {
              "name": "29688",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29688"
            },
            {
              "name": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/",
              "refsource": "CONFIRM",
              "url": "http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"
            },
            {
              "name": "http://trac.osgeo.org/mapserver/ticket/2256",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/ticket/2256"
            },
            {
              "name": "26561",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26561"
            },
            {
              "name": "26718",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26718"
            },
            {
              "name": "FEDORA-2007-2018",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"
            },
            {
              "name": "ADV-2007-2974",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2974"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346",
              "refsource": "MISC",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346"
            },
            {
              "name": "25582",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25582"
            },
            {
              "name": "DSA-1539",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1539"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4542",
    "datePublished": "2007-08-27T21:00:00",
    "dateReserved": "2007-08-27T00:00:00",
    "dateUpdated": "2024-08-07T15:01:09.799Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}