DSA-2916-1 libmms -- security update

Related Vulnerabilities: CVE-2014-2892  

Alex Chapman discovered that a buffer overflow in processing MMS over HTTP messages could result in the execution of arbitrary code. For the oldstable distribution (squeeze), this problem has been fixed in version 0.6-1+squeeze2. For the stable distribution (wheezy), this problem has been fixed in version 0.6.2-3+deb7u1. For the unstable distribution (sid), this problem has been fixed in version 0.6.2-4. We recommend that you upgrade your libmms packages.

Debian Security Advisory

DSA-2916-1 libmms -- security update

Date Reported:
28 Apr 2014
Affected Packages:
libmms
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2014-2892.
More information:

Alex Chapman discovered that a buffer overflow in processing MMS over HTTP messages could result in the execution of arbitrary code.

For the oldstable distribution (squeeze), this problem has been fixed in version 0.6-1+squeeze2.

For the stable distribution (wheezy), this problem has been fixed in version 0.6.2-3+deb7u1.

For the unstable distribution (sid), this problem has been fixed in version 0.6.2-4.

We recommend that you upgrade your libmms packages.