CVE-2017-5522Improper Restriction of Operations within the Bounds of a Memory Buffer in Mapserver

Severity
9.8CRITICALNVD
EPSS
6.0%
top 9.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 15
Latest updateMay 13

Description

Stack-based buffer overflow in MapServer before 6.0.6, 6.2.x before 6.2.4, 6.4.x before 6.4.5, and 7.0.x before 7.0.4 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via vectors involving WFS get feature requests.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

debiandebian/mapserver< mapserver 7.0.4-1 (bookworm)
Debianosgeo/mapserver< 7.0.4-1+3
NVDosgeo/mapserver6.0.5+13

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-959f-7f6r-rgh6: Stack-based buffer overflow in MapServer before 62022-05-13
OSV
CVE-2017-5522: Stack-based buffer overflow in MapServer before 62017-03-15

📋Vendor Advisories

1
Debian
CVE-2017-5522: mapserver - Stack-based buffer overflow in MapServer before 6.0.6, 6.2.x before 6.2.4, 6.4.x...2017

💬Community

3
Bugzilla
CVE-2017-5522 mapserver: Stack-buffer overflow with specific WFS get feature requests [epel-6]2017-01-23
Bugzilla
CVE-2017-5522 mapserver: Stack-buffer overflow with specific WFS get feature requests2017-01-23
Bugzilla
CVE-2017-5522 mapserver: Stack-buffer overflow with specific WFS get feature requests [fedora-all]2017-01-23
CVE-2017-5522 — Debian Mapserver vulnerability | cvebase