Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-16395

Опубликовано: 17 сент. 2019
Источник: debian

Описание

GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() function in cobc/tree.c via crafted COBOL source code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnucobolfixed4.0~early~20200606-1package
gnucobolignoredbusterpackage
open-cobolremovedpackage
open-cobolignoredstretchpackage
open-cobolno-dsajessiepackage

Примечания

  • https://sourceforge.net/p/gnucobol/bugs/586/

  • Fixed by: https://sourceforge.net/p/open-cobol/code/3346/

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() function in cobc/tree.c via crafted COBOL source code.

CVSS3: 7.8
nvd
больше 6 лет назад

GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() function in cobc/tree.c via crafted COBOL source code.

github
больше 3 лет назад

GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() function in cobc/tree.c via crafted COBOL source code.