Multiple stack-based buffer overflows in AFFLIB before 2.2.6 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a long LastModified value in an S3 XML response in lib/s3.cpp; (2) a long (a) path or (b) bucket in an S3 URL in lib/vnode_s3.cpp; or (3) a long (c) EFW, (d) AFD, or (c) aimage file path. NOTE: the aimage vector (3c) has since been recalled from the researcher's original advisory, since the code is not called in any version of AFFLIB.
References
Configurations
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/35613 - | |
References | () http://osvdb.org/35614 - | |
References | () http://osvdb.org/35615 - | |
References | () http://securityreason.com/securityalert/2655 - | |
References | () http://www.securityfocus.com/archive/1/467038/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/23695 - Patch | |
References | () http://www.vsecurity.com/bulletins/advisories/2007/afflib-overflows.txt - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33961 - |
Information
Published : 2007-04-30 22:19
Updated : 2024-11-21 00:29
NVD link : CVE-2007-2053
Mitre link : CVE-2007-2053
CVE.ORG link : CVE-2007-2053
JSON object : View
Products Affected
afflib
- afflib
CWE