Tuesday, August 3, 2010

Debian Security Advisory : mapserver - arbitrary code execution fixed vulnerability

Users of Debian Security Advisory please be advised of a mapserver - arbitrary code execution fixed vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
DSA 2078-1-2: DSA 2078-1-2 - mapserver - arbitrary code execution fixed
Debian Security Advisory
A stack-based buffer overflow in the msTmpFile function might lead to

arbitrary code execution under some conditions.
It was discovered that the CGI debug command-line arguments which are

enabled by default are insecure and may allow a remote attacker to

execute arbitrary code. Therefore they have been disabled by default.
CVE-2010-2540

CVE-2010-2539
Read more at www.criticalwatch.com
 

No comments:

Post a Comment