CVE-2008-2654
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
13/06/2008
Last modified:
09/04/2025
Description
Off-by-one error in the read_client function in webhttpd.c in Motion 3.2.10 and earlier might allow remote attackers to execute arbitrary code via a long request to a Motion HTTP Control interface, which triggers a stack-based buffer overflow with some combinations of processor architecture and compiler.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:lavrsen:motion:*:*:*:*:*:*:*:* | 3.2.10 (including) | |
cpe:2.3:a:lavrsen:motion:3.1.17:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.1.18:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.1.19:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.1.20:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.2.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.2.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.2.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.2.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:lavrsen:motion:3.2.9:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484572
- http://marc.info/?l=oss-security&m=121311577731820&w=2
- http://marc.info/?l=oss-security&m=121314089321816&w=2
- http://marc.info/?l=oss-security&m=121314329424538&w=2
- http://marc.info/?l=oss-security&m=121314471626034&w=2
- http://secunia.com/advisories/30544
- http://secunia.com/advisories/30864
- http://security.gentoo.org/glsa/glsa-200807-02.xml
- http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x10/webhttpd-security.diff
- http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x9/webhttpd-security-video2-backport.diff
- http://www.securityfocus.com/bid/29636
- http://www.vupen.com/english/advisories/2008/1796
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42979
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484572
- http://marc.info/?l=oss-security&m=121311577731820&w=2
- http://marc.info/?l=oss-security&m=121314089321816&w=2
- http://marc.info/?l=oss-security&m=121314329424538&w=2
- http://marc.info/?l=oss-security&m=121314471626034&w=2
- http://secunia.com/advisories/30544
- http://secunia.com/advisories/30864
- http://security.gentoo.org/glsa/glsa-200807-02.xml
- http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x10/webhttpd-security.diff
- http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x9/webhttpd-security-video2-backport.diff
- http://www.securityfocus.com/bid/29636
- http://www.vupen.com/english/advisories/2008/1796
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42979