[Secure-testing-team] Bug#481186: CVE-2008-2149: buffer overflows
Andreas Tille
tillea at rki.de
Thu May 15 12:46:57 UTC 2008
On Wed, 14 May 2008, Steffen Joeris wrote:
> CVE-2008-2149:
>
> Stack-based buffer overflow in the searchwn function in Wordnet 2.0,
> 2.1, and 3.0 might allow context-dependent attackers to execute
> arbitrary code via a long command line option. NOTE: this issue probably
> does not cross privilege boundaries except in cases in which Wordnet is
> used as a back end.
>
> More information can be found in the gentoo bugreport(1).
As stated in the Gentoo BTS
https://bugs.gentoo.org/show_bug.cgi?id=211491
there are potentially more issues of other sprintf()/strcpy()/strcat()/...
occurences. So I wonder if you accept the attached patch as a fix for
the problem. It actually cures the long command line option problem but
not more.
Kind regards
Andreas.
--
http://fam-tille.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 50_CVE-2008-2149_buffer_overflows.patch
Type: text/x-diff
Size: 463 bytes
Desc:
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20080515/d7293c34/attachment.patch
More information about the Secure-testing-team
mailing list