Lucene search

K
osvGoogleOSV:DSA-2079-1
HistoryJul 31, 2010 - 12:00 a.m.

mapserver - arbitrary code execution

2010-07-3100:00:00
Google
osv.dev
5

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

81.1%

Several vulnerabilities have been discovered in mapserver, a CGI-based
web framework to publish spatial data and interactive mapping applications.
The Common Vulnerabilities and Exposures project identifies the following
problems:

  • CVE-2010-2539
    A stack-based buffer overflow in the msTmpFile function might lead to
    arbitrary code execution under some conditions.
  • CVE-2010-2540
    It was discovered that the CGI debug command-line arguments which are
    enabled by default are insecure and may allow a remote attacker to
    execute arbitrary code. Therefore they have been disabled by default.

For the stable distribution (lenny), this problem has been fixed in
version 5.0.3-3+lenny5.

For the testing distribution (squeeze), this problem has been fixed in
version 5.6.4-1.

For the unstable distribution (sid), this problem has been fixed in
version 5.6.4-1.

We recommend that you upgrade your mapserver packages.

CPENameOperatorVersion
mapservereq5.0.3-3
mapservereq5.0.3-3+lenny4

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

81.1%