*** This bug is a security vulnerability *** Public security bug reported:
References: DSA-1539-1 (http://www.debian.org/security/2008/dsa-1539) Quoting: "Chris Schmidt and Daniel Morissette discovered two vulnerabilities in mapserver, a development environment for spatial and mapping applications. The Common Vulnerabilities and Exposures project identifies the following two problems: CVE-2007-4542 Lack of input sanitizing and output escaping in the CGI mapserver's template handling and error reporting routines leads to cross-site scripting vulnerabilities. CVE-2007-4629 Missing bounds checking in mapserver's template handling leads to a stack-based buffer overrun vulnerability, allowing a remote attacker to execute arbitrary code with the privileges of the CGI or httpd user." ** Affects: mapserver (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-4542 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-4629 -- [mapserver] [CVE-2007-4542, CVE-2007-4629] insufficient input sanitizing and buffer overflow vulnerability https://bugs.launchpad.net/bugs/214972 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs