Multiple stack-based buffer overflows in AFFLIB before 2.2.6 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a long LastModified value in an S3 XML response in lib/s3.cpp; (2) a long (a) path or (b) bucket in an S3 URL in lib/vnode_s3.cpp; or (3) a long (c) EFW, (d) AFD, or (c) aimage file path. NOTE: the aimage vector (3c) has since been recalled from the researcher's original advisory, since the code is not called in any version of AFFLIB.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2007-04-30T22:00:00
Updated: 2024-08-07T13:23:50.423Z
Reserved: 2007-04-16T00:00:00
Link: CVE-2007-2053
Vulnrichment
No data.
NVD
Status : Modified
Published: 2007-04-30T22:19:00.000
Modified: 2024-11-21T00:29:47.540
Link: CVE-2007-2053
Redhat
No data.