Heap-based buffer overflow in LiveData Protocol Server 5.00.045, and other versions before update 500062 (5.00.062), allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted request for a WSDL file that causes a negative length to be used in a strncpy call.
Link | Tags |
---|---|
http://osvdb.org/35529 | vdb entry |
http://www.securityfocus.com/bid/23773 | patch vdb entry |
http://www.vupen.com/english/advisories/2007/1633 | vdb entry |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=523 | third party advisory |
http://www.kb.cert.org/vuls/id/213516 | third party advisory us government resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34031 | vdb entry |
http://www.securitytracker.com/id?1017998 | vdb entry |
http://secunia.com/advisories/25076 | third party advisory vendor advisory |