7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.209 Low
EPSS
Percentile
96.4%
Debian Security Advisory DSA-2916-1 [email protected]
http://www.debian.org/security/ Moritz Muehlenhoff
April 28, 2014 http://www.debian.org/security/faq
Package : libmms
CVE ID : CVE-2014-2892
Alex Chapman discovered that a buffer overflow in processing "MMS over
HTTP" messages could result in the execution of arbitrary code.
For the oldstable distribution (squeeze), this problem has been fixed in
version 0.6-1+squeeze2.
For the stable distribution (wheezy), this problem has been fixed in
version 0.6.2-3+deb7u1.
For the unstable distribution (sid), this problem has been fixed in
version 0.6.2-4.
We recommend that you upgrade your libmms packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | all | libmms | < 0.6.2-3+deb7u1 | libmms_0.6.2-3+deb7u1_all.deb |
Debian | 6 | all | libmms0 | < 0.6-1+squeeze2 | libmms0_0.6-1+squeeze2_all.deb |
Debian | 6 | all | libmms-dev | < 0.6-1+squeeze2 | libmms-dev_0.6-1+squeeze2_all.deb |
Debian | 6 | all | libmms | < 0.6-1+squeeze2 | libmms_0.6-1+squeeze2_all.deb |