Lucene search

K
freebsdFreeBSDBA51C2F7-5B43-11E1-8288-00262D5ED8EE
HistoryDec 21, 2011 - 12:00 a.m.

plib -- remote code execution via buffer overflow

2011-12-2100:00:00
vuxml.freebsd.org
11

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.385

Percentile

97.3%

Secunia reports:

A vulnerability has been discovered in PLIB, which can be
exploited by malicious people to compromise an application using
the library.
The vulnerability is caused due to a boundary error within the
“ulSetError()” function (src/util/ulError.cxx) when creating the
error message, which can be exploited to overflow a static
buffer.
Successful exploitation allows the execution of arbitrary code
but requires that the attacker can e.g. control the content of
an overly long error message passed to the “ulSetError()”
function.
The vulnerability is confirmed in version 1.8.5. Other versions
may also be affected.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchtorcs< 1.3.3UNKNOWN
FreeBSDanynoarchplib<= 1.8.5_3UNKNOWN

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.385

Percentile

97.3%