CVE-2014-2892

NameCVE-2014-2892
DescriptionHeap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2916-1
Debian Bugs745301

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libmms (PTS)sid, trixie, buster, bookworm, bullseye0.6.4-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libmmssourcesqueeze0.6-1+squeeze2DSA-2916-1
libmmssourcewheezy0.6.2-3+deb7u1DSA-2916-1
libmmssource(unstable)0.6.2-4745301
xine-libsource(unstable)(not affected)

Notes

- xine-lib <not-affected> (mmsh is libmms-specific)
http://sourceforge.net/p/libmms/code/ci/03bcfccc22919c72742b7338d02859962861e0e8

Search for package or bug name: Reporting problems