7.5
CVSSv2

CVE-2014-2892

Published: 22/04/2014 Updated: 29/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the get_answer function in mmsh.c in libmms prior to 0.6.4 allows remote malicious users to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.

Vulnerable Product Search on Vulmon Subscribe to Product

libmms project libmms

libmms project libmms 0.6.2

libmms project libmms 0.6.1

libmms project libmms 0.6

Vendor Advisories

Debian Bug report logs - #745301 libmms: CVE-2014-2892: heap-based buffer overflow Package: src:libmms; Maintainer for src:libmms is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 20 Apr 2014 10:03:02 UTC Severity: grave Tags: fixed ...
Alex Chapman discovered that a buffer overflow in processing MMS over HTTP messages could result in the execution of arbitrary code For the oldstable distribution (squeeze), this problem has been fixed in version 06-1+squeeze2 For the stable distribution (wheezy), this problem has been fixed in version 062-3+deb7u1 For the unstable distributi ...