[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-2654Date: (C)2008-06-13   (M)2023-12-22


Off-by-one error in the read_client function in webhttpd.c in Motion 3.2.10 and earlier might allow remote attackers to execute arbitrary code via a long request to a Motion HTTP Control interface, which triggers a stack-based buffer overflow with some combinations of processor architecture and compiler.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
BID-29636
SECUNIA-30544
SECUNIA-30864
ADV-2008-1796
GLSA-200807-02
http://marc.info/?l=oss-security&m=121314089321816&w=2
http://marc.info/?l=oss-security&m=121311577731820&w=2
http://marc.info/?l=oss-security&m=121314329424538&w=2
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484572
http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x10/webhttpd-security.diff
http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x9/webhttpd-security-video2-backport.diff
motion-readclient-bo(42979)

CWE    1
CWE-189

© SecPod Technologies