Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 19 Jul 2011 17:28:29 +0200
From: Even Rouault <>
To:, Jan Lieskovsky <>
Cc: "Steven M. Christey" <>,, Even Rouault <>, Pavel Lisý <>,
Subject: Re: CVE Request -- MapServer -- SQL injections in OGC filter encoding and in WMS time support.

Selon Jan Lieskovsky <>:


I believe Alan Boudreault (MapServer team member that I've added to the CC list)
has already asked the Debian security team to request for a CVE number, but
without any result for now. Maybe he can confirm.

Best regards,


> Hello Josh, Steve, vendors,
>    the following has been brought to our attention:
>    [1]
>    [2]
> More from [2]:
> This ticket is to track fixes to prevent SQL injections through OGC
> filter encoding (in WMS, WFS and SOS), as well as a potential SQL
> injection in WMS time support.
> Your system may be vulnerable if it has MapServer with OGC protocols
> enabled, with layers connecting to an SQL RDBMS backend, either natively
> or via OGR.
> All versions of MapServer 4.x, 5.x and 6.x are potentially vulnerable.
> All users are ** strongly encouraged ** to upgrade to one of the latest
> releases with the fixes.
> Could you allocate a CVE id for this?
> Thank you && Regards, Jan.
> --
> Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.