[Forgot Password]
Login  Register Subscribe

23631

 
 

121626

 
 

98503

 
 

909

 
 

79321

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-2654

Date: (C)2008-06-13   (M)2017-08-08 


Off-by-one error in the read_client function in webhttpd.c in Motion 3.2.10 and earlier might allow remote attackers to execute arbitrary code via a long request to a Motion HTTP Control interface, which triggers a stack-based buffer overflow with some combinations of processor architecture and compiler.

CVSS Score: 10.0Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
BID-29636
SECUNIA-30544
SECUNIA-30864
ADV-2008-1796
GLSA-200807-02
http://marc.info/?l=oss-security&m=121314089321816&w=2
http://marc.info/?l=oss-security&m=121311577731820&w=2
http://marc.info/?l=oss-security&m=121314471626034&w=2
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484572
http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x10/webhttpd-security.diff
http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x9/webhttpd-security-video2-backport.diff
motion-readclient-bo(42979)

CWE    1
CWE-189

© 2013 SecPod Technologies