CVE-2009-2281
Vulnerability from cvelistv5
Published
2009-10-23 18:00
Modified
2024-09-16 16:23
Severity ?
Summary
Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:55.899Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
          },
          {
            "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
          },
          {
            "name": "DSA-1914",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1914"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.osgeo.org/mapserver/ticket/2943"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-10-23T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
        },
        {
          "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
        },
        {
          "name": "DSA-1914",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1914"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.osgeo.org/mapserver/ticket/2943"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2281",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6"
            },
            {
              "name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz",
              "refsource": "CONFIRM",
              "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz"
            },
            {
              "name": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT"
            },
            {
              "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1"
            },
            {
              "name": "DSA-1914",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1914"
            },
            {
              "name": "http://trac.osgeo.org/mapserver/ticket/2943",
              "refsource": "CONFIRM",
              "url": "http://trac.osgeo.org/mapserver/ticket/2943"
            },
            {
              "name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz",
              "refsource": "CONFIRM",
              "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2281",
    "datePublished": "2009-10-23T18:00:00Z",
    "dateReserved": "2009-07-01T00:00:00Z",
    "dateUpdated": "2024-09-16T16:23:42.293Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-2281\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-10-23T18:30:00.297\",\"lastModified\":\"2024-11-21T01:04:30.693\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamiento de b\u00fafer basados en memoria din\u00e1mica en la funci\u00f3n readPostBody en cgiutil.c de mapserv en MapServer v4.x hasta v4.10.4 y v5.x anteriores a v5.4.2, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de (1) una cabecera de HTTP \\\"Content-Length\\\" manipulada o (2) una petici\u00f3n HTTP larga, relacionado con un desbordamiento de entero que provoca una desbordamiento de b\u00fafer basado en memoria din\u00e1mica. NOTA: Esta vulnerabilidad existe por un correcci\u00f3n incompleta de CVE-2009-0840.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7362D32E-07AF-4DFB-A7EE-B92A2949FCC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16812C55-8E9F-4035-92E6-D2C7AF4F5B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C11F257-809F-4F7C-B5B1-5D407B983DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AFFE501-B4E0-4352-8C8D-44531E8A6ED3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE55464C-FD27-47BF-9941-26EE7968BF70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E01A6111-3A73-4033-8333-4929A6A22CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE4F9152-4BA9-4742-9041-9707BB4B505F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F27BB1D-165E-4414-AB9B-5BBDF4268F73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9305883D-8626-448C-8B1A-074158F518DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D30449-7EEB-42C4-9F11-4E6EE39C18F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE53FF73-329B-4384-B636-2F4050778FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B52B92DB-535F-45B7-AF32-B97216A4C4B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C410FF2E-E1C6-4238-94ED-3EC6389C961D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"279DE3C1-7BEB-43A4-A91B-06D3A53C30A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"279EDC4E-87CC-48ED-B735-84F96DC5796E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"53AB964F-61BD-4EC5-8469-7DB371154455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27C5F5A-6B68-4723-809B-C482238F9647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"43CFB610-77A2-436E-ADD0-C0D647AF56DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC2E86BD-2358-46D5-BBB5-147168001578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6257B30-61DC-4838-92E6-D9938224BFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C661B582-E2F6-4E91-A47C-E91CCB0ECF2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E60110D-1CED-47BE-8565-FE858BEFF44B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B061F26-EF3F-48CC-A974-5B49A622C5FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0870B801-E121-47D8-9C88-B01C7AB6ED3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0F320C0-1A33-4768-9BB1-09C6554A9C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"81C28558-F40D-48B9-B98C-F30709C89AD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"65E266D2-C1F2-4400-9E41-AEB2F116C733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9161B916-5EED-46C4-8E0C-515A0B6D2902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9689CB4-A70C-42D7-91E0-68057D9D4779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6767A7E5-7A2C-452D-A6EB-9C61B43DC39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"119B427D-87AC-4DD8-AD13-B8CFC847A947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"57221C0B-EE09-4EB6-AE21-3C31393EB922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"74EEC8BC-A00F-4DCF-B787-5B95699DBD80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9030BE8-663A-4F46-B255-0AEBFD790DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A456E60-8073-4726-AC77-573DCA877FAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A6832D8-7E2B-457A-ABBC-09761DD73ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"38513CAF-212E-495E-844F-09554FAC0B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"20037250-ACD8-4425-898E-A5E857E3D159\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6173ECB3-07D7-43D7-8B0A-C524C5E9F231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"753D71D6-4535-475D-96F1-42217F9ADE22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"517783AC-5678-48B9-A3FE-BEDCE1176651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"577E45A9-D259-4DD3-803F-459640673865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"203F6A08-17BF-4F82-82C5-E0653C2100F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E939104D-9765-4DBF-AA1D-97EBBE515972\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"93188DA2-4137-4291-9FDC-469D933C9602\"}]}]}],\"references\":[{\"url\":\"http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://trac.osgeo.org/mapserver/ticket/2943\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1914\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/07/01/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/07/01/6\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://trac.osgeo.org/mapserver/ticket/2943\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1914\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/07/01/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/07/01/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.