Buffer overflow in cgi.c in www-sql before 0.5.7 allows local users to execute arbitrary code via a web page that is processed by www-sql.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://www.debian.org/security/2004/dsa-523 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/10577 | vdb entry third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16455 | vdb entry third party advisory |