[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] plib ulSetError() buffer overflow - CVE-2011-4620
From:       Kurt Seifried <kseifried () redhat ! com>
Date:       2011-12-21 22:01:15
Message-ID: 4EF2572B.4050506 () redhat ! com
[Download RAW message or body]


https://secunia.com/advisories/47297/
http://plib.sourceforge.net/index.html
http://www.exploit-db.com/exploits/18258/

 From Secunia:

======================
*Description*
A vulnerability has been discovered in PLIB, which can be exploited by 
malicious people to compromise an application using the library.

The vulnerability is caused due to a boundary error within the 
"ulSetError()" function (src/util/ulError.cxx) when creating the error 
message, which can be exploited to overflow a static buffer.

Successful exploitation allows the execution of arbitrary code but 
requires that the attacker can e.g. control the content of an overly 
long error message passed to the "ulSetError()" function.

The vulnerability is confirmed in version 1.8.5. Other versions may also 
be affected.
======================

Please use CVE-2011-4620 for this issue.

-- 

-Kurt Seifried / Red Hat Security Response Team



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic