Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.6.2-3ubuntu2.1", "binary_name": "libmms-dev" }, { "binary_version": "0.6.2-3ubuntu2.1", "binary_name": "libmms0" }, { "binary_version": "0.6.2-3ubuntu2.1", "binary_name": "libmms0-dbgsym" } ] }