Heap-based buffer overflow in LiveData Protocol Server 5.00.045, and other versions before update 500062 (5.00.062), allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted request for a WSDL file that causes a negative length to be used in a strncpy call.
References
Configurations
History
21 Nov 2024, 00:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=523 - | |
References | () http://osvdb.org/35529 - | |
References | () http://secunia.com/advisories/25076 - Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/213516 - US Government Resource | |
References | () http://www.securityfocus.com/bid/23773 - Patch | |
References | () http://www.securitytracker.com/id?1017998 - | |
References | () http://www.vupen.com/english/advisories/2007/1633 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34031 - |
Information
Published : 2007-05-03 23:19
Updated : 2025-04-09 00:30
NVD link : CVE-2007-2489
Mitre link : CVE-2007-2489
CVE.ORG link : CVE-2007-2489
JSON object : View
Products Affected
livedata
- protocol_server
CWE