Multiple stack-based buffer overflows in MinaliC 2.0.0 allow remote attackers to execute arbitrary code via a (1) session_id cookie in a request to the get_cookie_value function in response.c, (2) directory name in a request to the add_default_file function in response.c, or (3) file name in a request to the retrieve_physical_file_name_or_brows function in response.c.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://secunia.com/advisories/45462 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74651 | vdb entry |
http://secunia.com/secunia_research/2012-5 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74653 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74652 | vdb entry |
http://www.securityfocus.com/bid/52873 | vdb entry |