Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
{ "binaries": [ { "binary_name": "libmms-dev", "binary_version": "0.6.2-3ubuntu2.1" }, { "binary_name": "libmms0", "binary_version": "0.6.2-3ubuntu2.1" } ], "availability": "No subscription required" }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-2892.json"