Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libmms-dev", "binary_version": "0.6.2-3ubuntu2.1" }, { "binary_name": "libmms0", "binary_version": "0.6.2-3ubuntu2.1" } ] }