Multiple stack-based buffer overflows in src/Task.cc in the FastCGI program in IIPImage Server before 0.9.8 might allow remote attackers to execute arbitrary code via vectors associated with crafted arguments to the (1) RGN::run, (2) JTLS::run, or (3) SHD::run function.  NOTE: some of these details are obtained from third party information.
                
            References
                    | Link | Resource | 
|---|---|
| http://freshmeat.net/projects/iipimage/releases/309013 | |
| http://secunia.com/advisories/37565 | Vendor Advisory | 
| http://iipimage.sourceforge.net/blog/ | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2009-12-08 11:30
Updated : 2011-01-03 21:00
NVD link : CVE-2009-4230
Mitre link : CVE-2009-4230
JSON object : View
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
                ruven_pillay
- iipimage_server
 


