Vulnerability Description
Multiple stack-based buffer overflows in src/Task.cc in the FastCGI program in IIPImage Server before 0.9.8 might allow remote attackers to execute arbitrary code via vectors associated with crafted arguments to the (1) RGN::run, (2) JTLS::run, or (3) SHD::run function. NOTE: some of these details are obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruven Pillay | Iipimage Server | <= 0.9.7 |
Related Weaknesses (CWE)
References
- http://freshmeat.net/projects/iipimage/releases/309013
- http://iipimage.sourceforge.net/blog/Vendor Advisory
- http://secunia.com/advisories/37565Vendor Advisory
- http://freshmeat.net/projects/iipimage/releases/309013
- http://iipimage.sourceforge.net/blog/Vendor Advisory
- http://secunia.com/advisories/37565Vendor Advisory
FAQ
What is CVE-2009-4230?
CVE-2009-4230 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple stack-based buffer overflows in src/Task.cc in the FastCGI program in IIPImage Server before 0.9.8 might allow remote attackers to execute arbitrary code via vectors associated with crafted a...
How severe is CVE-2009-4230?
CVE-2009-4230 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4230?
Check the references section above for vendor advisories and patch information. Affected products include: Ruven Pillay Iipimage Server.