Page 4 of 21 results (0.004 seconds)

CVSS: 4.3EPSS: 1%CPEs: 42EXPL: 1

mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to read arbitrary invalid .map files via a full pathname in the map parameter, which triggers the display of partial file contents within an error message, as demonstrated by a /tmp/sekrut.map symlink. mapserv en MapServer 4.x versiones anteriores a v4.10.4 y 5.x versiones anteriores a v5.2.2 permite a atacantes remotos leer ficheros .map inválidos de su elección a través de una ruta completa en el parámetro "map", lo cual dispara la pantalla del contenido de un fichero parcial dentro de un mensaje de error, como lo demostrado por un symlink /tmp/sekrut.map. • http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html http://secunia.com/advisories/34520 http://secunia.com/advisories/34603 http://trac.osgeo.org/mapserver/ticket/2941 http://www.debian.org/security/2009/dsa-1914 http://www.positronsecurity.com/advisories/2009-000.html http://www.securityfocus.com/archive/1/502271/100/0/threaded http://www.securityfocus.com/bid/34306 http://www.securitytracker.com/id?1021952 https://www.redhat.com/archives/fedora-package-an • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 42EXPL: 0

The msLoadQuery function in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to determine the existence of arbitrary files via a full pathname in the queryfile parameter, which triggers different error messages depending on whether this pathname exists. La función msLoadQuery mapserv en MapServer v4.x y anteriores, v4.10.4 y v5.x anteriores v5.2.2, permite a atacantes remotos determinar la existencia de ficheros a través de un Path completo en el parámetro queryfile, lo que provoca diferentes mensajes de error dependiendo de si existe la ruta. • http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html http://secunia.com/advisories/34520 http://secunia.com/advisories/34603 http://trac.osgeo.org/mapserver/ticket/2939 http://www.debian.org/security/2009/dsa-1914 http://www.positronsecurity.com/advisories/2009-000.html http://www.securityfocus.com/archive/1/502271/100/0/threaded http://www.securityfocus.com/bid/34306 http://www.securitytracker.com/id?1021952 https://www.redhat.com/archives/fedora-package-an • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 16%CPEs: 42EXPL: 1

Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action. Desbordamiento de búfer basado en pila en mapserv.c en mapserv en MapServer v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2, cuando el servidor tiene un mapa con un atributo largo IMAGEPATH O NAME, permite a atacantes remotos ejecutar código arbitrario a través de un parámetro "id" manipulado en una acción "query". • http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html http://secunia.com/advisories/34520 http://secunia.com/advisories/34603 http://trac.osgeo.org/mapserver/ticket/2944 http://www.debian.org/security/2009/dsa-1914 http://www.positronsecurity.com/advisories/2009-000.html http://www.securityfocus.com/archive/1/502271/100/0/threaded http://www.securityfocus.com/bid/34306 http://www.securitytracker.com/id?1021952 https://www.redhat.com/archives/fedora-package-an • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 3%CPEs: 42EXPL: 1

Heap-based buffer underflow in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to have an unknown impact via a negative value in the Content-Length HTTP header. Desbordamiento inferior de búfer basado en montículo en la función readPostBody en cgiutil.c en mapserv v4.x anterior a v4.10.4 y v5.x anterior a v5.2.2, permite a atacantes remotos tener un impacto desconocido a través de un valor negativo en la cabecera HTTP Content-Length. • http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html http://secunia.com/advisories/34520 http://secunia.com/advisories/34603 http://trac.osgeo.org/mapserver/ticket/2943 http://www.debian.org/security/2009/dsa-1914 http://www.positronsecurity.com/advisories/2009-000.html http://www.securityfocus.com/archive/1/502271/100/0/threaded http://www.securityfocus.com/bid/34306 http://www.securitytracker.com/id?1021952 https://exchange.xforce.ibmcloud.com/vulnerabilities/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name. Desbordamiento del buffer en la función processLine en maptemplate.c en MapServer en versiones anteriores a 4.10.3 permite a atacantes remotos provocar una caída de servicio y posiblemente ejecutar un código arbitrario a través de un mapfile con un nombre largo de capa, nombre de grupo o nombre de entrada metadata largos. • http://mapserver.gis.umn.edu/download/current/HISTORY.TXT http://secunia.com/advisories/26561 http://secunia.com/advisories/26718 http://secunia.com/advisories/29688 http://securityreason.com/securityalert/3082 http://trac.osgeo.org/mapserver/ticket/2252 http://www.debian.org/security/2008/dsa-1539 http://www.securityfocus.com/bid/25582 http://www.vupen.com/english/advisories/2007/2974 https://bugzilla.redhat.com/show_bug.cgi?id=272081 https://www.redhat.com/archives/fedo • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •