Page 3 of 19 results (0.003 seconds)

CVSS: 10.0EPSS: 1%CPEs: 42EXPL: 1

mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 does not ensure that the string holding the id parameter ends in a '\0' character, which allows remote attackers to conduct buffer-overflow attacks or have unspecified other impact via a long id parameter in a query action. mapserv.c en mapserv en MapServer v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2 no garantiza que la cadena que soporta el parámetro "id" finalice en un carácter '\0', lo que permite a atacantes remotos dirigir un ataque de desbordamiento de búfer o tener un otro impacto sin especificar a través de un parámetro "id" largo en una acción de consulta. • http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html http://secunia.com/advisories/34603 http://www.positronsecurity.com/advisories/2009-000.html http://www.securityfocus.com/archive/1/502271/100/0/threaded http://www.securityfocus.com/bid/34306 http://www.securitytracker.com/id?1021952 https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 1%CPEs: 42EXPL: 1

Multiple stack-based buffer overflows in maptemplate.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 have unknown impact and remote attack vectors. Desbordamiento múltiple de búfer basado en pila en el archivo maptemplate.c en mapserv en MapServer v4.x anteriores a v4.10.4 y v5.x anteriores a v5.2.2 con impacto desconocido y vectores de ataque remoto. • http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html http://secunia.com/advisories/34603 http://trac.osgeo.org/mapserver/ticket/2944 http://www.positronsecurity.com/advisories/2009-000.html http://www.securityfocus.com/archive/1/502271/100/0/threaded http://www.securityfocus.com/bid/34306 http://www.securitytracker.com/id?1021952 https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html https://www.redhat.com/archives/fedora-package-announce/200 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 2%CPEs: 42EXPL: 1

Directory traversal vulnerability in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when running on Windows with Cygwin, allows remote attackers to create arbitrary files via a .. (dot dot) in the id parameter. Vulnerabilidad de salto de directorio en mapserv.c en mapserv en MapServer v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2, cuando se ejecuta sobre Windows con Cygwin, permite a atacantes remotos crear fichero de modo arbitrario a traves de ..(punto punto) en el parametro "id". • http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html http://secunia.com/advisories/34520 http://secunia.com/advisories/34603 http://trac.osgeo.org/mapserver/ticket/2942 http://www.debian.org/security/2009/dsa-1914 http://www.positronsecurity.com/advisories/2009-000.html http://www.securityfocus.com/archive/1/502271/100/0/threaded http://www.securityfocus.com/bid/34306 http://www.securitytracker.com/id?1021952 https://exchange.xforce.ibmcloud.com/vulnerabilities/ • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 1%CPEs: 42EXPL: 1

mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to read arbitrary invalid .map files via a full pathname in the map parameter, which triggers the display of partial file contents within an error message, as demonstrated by a /tmp/sekrut.map symlink. mapserv en MapServer 4.x versiones anteriores a v4.10.4 y 5.x versiones anteriores a v5.2.2 permite a atacantes remotos leer ficheros .map inválidos de su elección a través de una ruta completa en el parámetro "map", lo cual dispara la pantalla del contenido de un fichero parcial dentro de un mensaje de error, como lo demostrado por un symlink /tmp/sekrut.map. • http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html http://secunia.com/advisories/34520 http://secunia.com/advisories/34603 http://trac.osgeo.org/mapserver/ticket/2941 http://www.debian.org/security/2009/dsa-1914 http://www.positronsecurity.com/advisories/2009-000.html http://www.securityfocus.com/archive/1/502271/100/0/threaded http://www.securityfocus.com/bid/34306 http://www.securitytracker.com/id?1021952 https://www.redhat.com/archives/fedora-package-an • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 42EXPL: 0

The msLoadQuery function in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to determine the existence of arbitrary files via a full pathname in the queryfile parameter, which triggers different error messages depending on whether this pathname exists. La función msLoadQuery mapserv en MapServer v4.x y anteriores, v4.10.4 y v5.x anteriores v5.2.2, permite a atacantes remotos determinar la existencia de ficheros a través de un Path completo en el parámetro queryfile, lo que provoca diferentes mensajes de error dependiendo de si existe la ruta. • http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html http://secunia.com/advisories/34520 http://secunia.com/advisories/34603 http://trac.osgeo.org/mapserver/ticket/2939 http://www.debian.org/security/2009/dsa-1914 http://www.positronsecurity.com/advisories/2009-000.html http://www.securityfocus.com/archive/1/502271/100/0/threaded http://www.securityfocus.com/bid/34306 http://www.securitytracker.com/id?1021952 https://www.redhat.com/archives/fedora-package-an • CWE-20: Improper Input Validation •