MGASA-2014-0190

Source
https://advisories.mageia.org/MGASA-2014-0190.html
Import Source
https://advisories.mageia.org/MGASA-2014-0190.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0190
Related
Published
2014-04-23T16:16:27Z
Modified
2014-04-23T16:16:21Z
Summary
Updated libmms packages fix CVE-2014-2892
Details

Updated libmms packages fix security vulnerability:

The libmms library before 0.6.4 is vulnerable to a buffer overflow in get_answer() in src/mmsh.c. It may be triggered via an overly long line of a MMSH (MMS over HTTP) server response, effectively overflowing the buffer which has a static size (CVE-2014-2892).

References
Credits

Affected packages

Mageia:3 / libmms

Package

Name
libmms
Purl
pkg:rpm/mageia/libmms?arch=source&distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.2-3.1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / libmms

Package

Name
libmms
Purl
pkg:rpm/mageia/libmms?arch=source&distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.2-4.1.mga4

Ecosystem specific

{
    "section": "core"
}