A buffer overflow vulnerability has been reported for LIBCGI. Reportedly, the vulnerability exists in the 'parse_field()' function in the 'cgi_lib.c' source file. The function does not perform adequate bounds checking on supplied input. Thus, it may be possible to cause 'parse_field()' to corrupt memory on the system stack. Exploiting this issue may allow a local attacker to overwrite sensitive memory with malicious values, thereby redirecting typical program flow to execute attacker-supplied commands.
A buffer overflow vulnerability has been reported for LIBCGI. Reportedly, the vulnerability exists in the 'parse_field()' function in the 'cgi_lib.c' source file. The function does not perform adequate bounds checking on supplied input. Thus, it may be possible to cause 'parse_field()' to corrupt memory on the system stack. Exploiting this issue may allow a local attacker to overwrite sensitive memory with malicious values, thereby redirecting typical program flow to execute attacker-supplied commands.