{"id":"CVE-2007-4629","details":"Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name.","modified":"2026-04-10T03:39:11.468727Z","published":"2007-08-31T01:17:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/26561"},{"type":"ADVISORY","url":"http://secunia.com/advisories/26718"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29688"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1539"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/2974"},{"type":"FIX","url":"http://mapserver.gis.umn.edu/download/current/HISTORY.TXT/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=272081"},{"type":"WEB","url":"http://securityreason.com/securityalert/3082"},{"type":"WEB","url":"http://trac.osgeo.org/mapserver/ticket/2252"},{"type":"WEB","url":"http://www.securityfocus.com/bid/25582"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00096.html"}],"schema_version":"1.7.5"}