Summary
Alex Chapman discovered that a buffer overflow in processing MMS over HTTP
messages could result in the execution of arbitrary code.
Solution
For the oldstable distribution (squeeze), this problem has been fixed in version 0.6-1+squeeze2.
For the stable distribution (wheezy), this problem has been fixed in version 0.6.2-3+deb7u1.
For the unstable distribution (sid), this problem has been fixed in version 0.6.2-4.
We recommend that you upgrade your libmms packages.
Affected
libmms on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-2892 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities