[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] plib ulSetError() buffer overflow - CVE-2011-4620
From: Kurt Seifried <kseifried () redhat ! com>
Date: 2011-12-21 22:01:15
Message-ID: 4EF2572B.4050506 () redhat ! com
[Download RAW message or body]
https://secunia.com/advisories/47297/
http://plib.sourceforge.net/index.html
http://www.exploit-db.com/exploits/18258/
From Secunia:
======================
*Description*
A vulnerability has been discovered in PLIB, which can be exploited by
malicious people to compromise an application using the library.
The vulnerability is caused due to a boundary error within the
"ulSetError()" function (src/util/ulError.cxx) when creating the error
message, which can be exploited to overflow a static buffer.
Successful exploitation allows the execution of arbitrary code but
requires that the attacker can e.g. control the content of an overly
long error message passed to the "ulSetError()" function.
The vulnerability is confirmed in version 1.8.5. Other versions may also
be affected.
======================
Please use CVE-2011-4620 for this issue.
--
-Kurt Seifried / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic