Description
Multiple stack-based buffer overflows in MinaliC 2.0.0 allow remote attackers to execute arbitrary code via a (1) session_id cookie in a request to the get_cookie_value function in response.c, (2) directory name in a request to the add_default_file function in response.c, or (3) file name in a request to the retrieve_physical_file_name_or_brows function in response.c.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-0309 | Multiple stack-based buffer overflows in MinaliC 2.0.0 allow remote attackers to execute arbitrary code via a (1) session_id cookie in a request to the get_cookie_value function in response.c, (2) directory name in a request to the add_default_file function in response.c, or (3) file name in a request to the retrieve_physical_file_name_or_brows function in response.c. |
References
History
No history.
Status: PUBLISHED
Assigner: flexera
Published:
Updated: 2024-08-06T18:23:29.218Z
Reserved: 2011-12-30T00:00:00.000Z
Link: CVE-2012-0273
No data.
Status : Modified
Published: 2014-06-20T14:55:05.153
Modified: 2026-05-06T22:30:45.220
Link: CVE-2012-0273
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD