CVE-2014-2892

Publication date 22 April 2014

Last updated 24 July 2024


Ubuntu priority

Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.

Status

Package Ubuntu Release Status
libmms 16.04 LTS xenial
Not affected
15.10 wily
Not affected
15.04 vivid Ignored end of life
14.10 utopic Ignored end of life
14.04 LTS trusty
Fixed 0.6.2-3ubuntu2.1
13.10 saucy Ignored end of life
12.10 quantal Ignored end of life
12.04 LTS precise
Fixed 0.6.2-2ubuntu0.1
10.04 LTS lucid Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libmms