CVE-2009-2281
Vulnerability from cvelistv5
Published
2009-10-23 18:00
Modified
2024-09-16 16:23
Severity ?
EPSS score ?
Summary
Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:44:55.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT" }, { "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1" }, { "name": "DSA-1914", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1914" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://trac.osgeo.org/mapserver/ticket/2943" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-10-23T18:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT" }, { "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1" }, { "name": "DSA-1914", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1914" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://trac.osgeo.org/mapserver/ticket/2943" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2281", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/07/01/6" }, { "name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz", "refsource": "CONFIRM", "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz" }, { "name": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT", "refsource": "CONFIRM", "url": "http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT" }, { "name": "[oss-security] 20090701 Re: incorrect upstream fix for CVE-2009-0840 (mapserver)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/07/01/1" }, { "name": "DSA-1914", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1914" }, { "name": "http://trac.osgeo.org/mapserver/ticket/2943", "refsource": "CONFIRM", "url": "http://trac.osgeo.org/mapserver/ticket/2943" }, { "name": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz", "refsource": "CONFIRM", "url": "http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2281", "datePublished": "2009-10-23T18:00:00Z", "dateReserved": "2009-07-01T00:00:00Z", "dateUpdated": "2024-09-16T16:23:42.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-2281\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-10-23T18:30:00.297\",\"lastModified\":\"2024-11-21T01:04:30.693\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamiento de b\u00fafer basados en memoria din\u00e1mica en la funci\u00f3n readPostBody en cgiutil.c de mapserv en MapServer v4.x hasta v4.10.4 y v5.x anteriores a v5.4.2, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de (1) una cabecera de HTTP \\\"Content-Length\\\" manipulada o (2) una petici\u00f3n HTTP larga, relacionado con un desbordamiento de entero que provoca una desbordamiento de b\u00fafer basado en memoria din\u00e1mica. NOTA: Esta vulnerabilidad existe por un correcci\u00f3n incompleta de CVE-2009-0840.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7362D32E-07AF-4DFB-A7EE-B92A2949FCC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16812C55-8E9F-4035-92E6-D2C7AF4F5B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C11F257-809F-4F7C-B5B1-5D407B983DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AFFE501-B4E0-4352-8C8D-44531E8A6ED3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"426DC6E0-2DA2-4815-B08B-EE2CF20AE3AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBEE70D8-0EC2-4855-81C8-9FECCD9C16BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE55464C-FD27-47BF-9941-26EE7968BF70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E01A6111-3A73-4033-8333-4929A6A22CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE4F9152-4BA9-4742-9041-9707BB4B505F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F27BB1D-165E-4414-AB9B-5BBDF4268F73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9305883D-8626-448C-8B1A-074158F518DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D30449-7EEB-42C4-9F11-4E6EE39C18F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE53FF73-329B-4384-B636-2F4050778FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B52B92DB-535F-45B7-AF32-B97216A4C4B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C410FF2E-E1C6-4238-94ED-3EC6389C961D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"279DE3C1-7BEB-43A4-A91B-06D3A53C30A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"279EDC4E-87CC-48ED-B735-84F96DC5796E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"53AB964F-61BD-4EC5-8469-7DB371154455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27C5F5A-6B68-4723-809B-C482238F9647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"43CFB610-77A2-436E-ADD0-C0D647AF56DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED26BFDF-0C8C-4BEF-BB2D-FA7ADB95AFB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC2E86BD-2358-46D5-BBB5-147168001578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6257B30-61DC-4838-92E6-D9938224BFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:4.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F28AEC9-4A65-4C66-90B2-4B3B83B2C91D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C661B582-E2F6-4E91-A47C-E91CCB0ECF2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E60110D-1CED-47BE-8565-FE858BEFF44B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B061F26-EF3F-48CC-A974-5B49A622C5FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0870B801-E121-47D8-9C88-B01C7AB6ED3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0F320C0-1A33-4768-9BB1-09C6554A9C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"81C28558-F40D-48B9-B98C-F30709C89AD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCEF61F4-F4CE-4E33-A67C-17B1D0185BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"65E266D2-C1F2-4400-9E41-AEB2F116C733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9161B916-5EED-46C4-8E0C-515A0B6D2902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9689CB4-A70C-42D7-91E0-68057D9D4779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6767A7E5-7A2C-452D-A6EB-9C61B43DC39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"119B427D-87AC-4DD8-AD13-B8CFC847A947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"57221C0B-EE09-4EB6-AE21-3C31393EB922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"74EEC8BC-A00F-4DCF-B787-5B95699DBD80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9030BE8-663A-4F46-B255-0AEBFD790DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A456E60-8073-4726-AC77-573DCA877FAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A6832D8-7E2B-457A-ABBC-09761DD73ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"38513CAF-212E-495E-844F-09554FAC0B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"20037250-ACD8-4425-898E-A5E857E3D159\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6173ECB3-07D7-43D7-8B0A-C524C5E9F231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"753D71D6-4535-475D-96F1-42217F9ADE22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"517783AC-5678-48B9-A3FE-BEDCE1176651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:osgeo:mapserver:5.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"577E45A9-D259-4DD3-803F-459640673865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"203F6A08-17BF-4F82-82C5-E0653C2100F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E939104D-9765-4DBF-AA1D-97EBBE515972\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"93188DA2-4137-4291-9FDC-469D933C9602\"}]}]}],\"references\":[{\"url\":\"http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://trac.osgeo.org/mapserver/ticket/2943\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1914\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/07/01/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/07/01/6\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.debian.org/pool/updates/main/m/mapserver/mapserver_4.10.0-5.1+etch4.diff.gz\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://security.debian.org/pool/updates/main/m/mapserver/mapserver_5.0.3-3+lenny4.diff.gz\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://trac.osgeo.org/mapserver/browser/tags/rel-5-4-2/mapserver/HISTORY.TXT\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://trac.osgeo.org/mapserver/ticket/2943\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1914\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/07/01/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/07/01/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.