Integer overflow in the ws_getpostvars function in Firefly Media Server (formerly mt-daapd) 0.2.4.1 (0.9~r1696-1.2 on Debian) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a large Content-Length.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://www.debian.org/security/2008/dsa-1597 | vendor advisory |
http://sourceforge.net/project/shownotes.php?release_id=593465&group_id=98211 | |
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00446.html | vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476241 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41850 | vdb entry |
http://www.securityfocus.com/bid/28860 | vdb entry |
http://secunia.com/advisories/30661 | third party advisory |
http://www.vupen.com/english/advisories/2008/1303/references | vdb entry |
http://www.securitytracker.com/id?1019908 | vdb entry |
http://secunia.com/advisories/29917 | third party advisory |
http://secunia.com/advisories/29919 | third party advisory |