CVE-2009-0842 Details

CVE-2009-0842

Published: 2009-03-31
Last Modified: 2018-10-10
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to read arbitrary invalid .map files via a full pathname in the map parameter, which triggers the display of partial file contents within an error message, as demonstrated by a /tmp/sekrut.map symlink.

Analysis
Common Vulnerability Score System v2.0
Severity Medium
Base Score 4.3/10
Exploit Score 8.6/10
Access Vector Network
Access Complexity Medium
Authentication None
Impact Score 2.9/10
Confidentiality Impact Partial
Availability Impact None
Integrity Impact None
Vector String AV:N/AC:M/Au:N/C:P/I:N/A:N
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.2:beta1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.4.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.4.0:beta1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.4.0:beta2:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.4.0:beta3:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.6.0:beta1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.6.0:beta2:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.6.0:beta3:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.6.0:rc1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.8:beta1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.8:beta2:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.8:beta3:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.8:rc1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.8:rc2:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.10:beta1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.10:beta2:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.10:beta3:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.10:rc1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.10.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.10.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.10.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:4.10.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.0.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.0.0:beta1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.0.0:beta2:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.0.0:beta3:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.0.0:beta4:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.0.0:beta5:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.0.0:beta6:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.0.0:rc1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.0.0:rc2:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.2.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.2.0:beta1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.2.0:beta2:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.2.0:beta3:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.2.0:beta4:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.2.0:rc1:*:*:*:*:*:* Yes - -
cpe:2.3:a:umn:mapserver:5.2.1:*:*:*:*:*:*:* Yes - -
References

http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html
http://secunia.com/advisories/34520
http://secunia.com/advisories/34603
http://trac.osgeo.org/mapserver/ticket/2941
http://www.debian.org/security/2009/dsa-1914
http://www.positronsecurity.com/advisories/2009-000.html
http://www.securityfocus.com/archive/1/502271/100/0/threaded
http://www.securityfocus.com/bid/34306
http://www.securitytracker.com/id?1021952
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html

CVE ID
CVE-2009-0842
Published
2009-03-31
Modified
2018-10-10
CVSSv2.0
Medium
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-200

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.