Unrated severityNVD Advisory· Published Apr 22, 2014· Updated May 6, 2026
CVE-2014-2892
CVE-2014-2892
Description
Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
Affected products
4cpe:2.3:a:libmms_project:libmms:*:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:libmms_project:libmms:*:*:*:*:*:*:*:*range: <=0.6.3
- cpe:2.3:a:libmms_project:libmms:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:libmms_project:libmms:0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:libmms_project:libmms:0.6.2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- www.openwall.com/lists/oss-security/2014/04/18/14nvdPatch
- sourceforge.net/p/libmms/code/ci/03bcfccc22919c72742b7338d02859962861e0e8nvdExploitPatch
- secunia.com/advisories/57875nvdVendor Advisory
- lists.opensuse.org/opensuse-updates/2014-05/msg00001.htmlnvd
- sourceforge.net/p/libmms/code/ci/master/tree/ChangeLognvd
- www.debian.org/security/2014/dsa-2916nvd
- www.securityfocus.com/bid/66933nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/92640nvd
- security.gentoo.org/glsa/201612-29nvd
News mentions
0No linked articles in our index yet.