Lucene search

K
freebsdFreeBSD13BF0602-C08A-11E2-BB21-083E8ED0F47B
HistoryDec 21, 2011 - 12:00 a.m.

plib -- buffer overflow

2011-12-2100:00:00
vuxml.freebsd.org
13

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.385

Percentile

97.3%

Secunia reports:

A vulnerability has been discovered in PLIB, which can be
exploited by malicious people to compromise an application
using the library. The vulnerability is caused due to a
boundary error within the “ulSetError()” function
(src/util/ulError.cxx) when creating the error message,
which can be exploited to overflow a static buffer.
Successful exploitation allows the execution of arbitrary
code but requires that the attacker can e.g. control the
content of an overly long error message passed to the
“ulSetError()” function.
The vulnerability is confirmed in version 1.8.5. Other
versions may also be affected.
Originally reported in TORCS by Andres Gomez.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchplib< 1.8.5_4UNKNOWN

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.385

Percentile

97.3%