Описание
Integer overflow in the load_iface function in Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 might allow context-dependent attackers to execute arbitrary code via a (1) file or (2) socket that provides configuration data with many entries, leading to a heap-based buffer overflow.
Integer overflow in the load_iface function in Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 might allow context-dependent attackers to execute arbitrary code via a (1) file or (2) socket that provides configuration data with many entries, leading to a heap-based buffer overflow.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2010-1620
- https://bugs.launchpad.net/ubuntu/+source/gnustep-base/+bug/573108
- http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz
- http://marc.info/?l=oss-security&m=127324274005709&w=2
- http://marc.info/?l=oss-security&m=127325778527537&w=2
- http://savannah.gnu.org/bugs/?29755
- http://secunia.com/advisories/39746
- http://thread.gmane.org/gmane.comp.lib.gnustep.bugs/12336
EPSS
CVE ID
Связанные уязвимости
Integer overflow in the load_iface function in Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 might allow context-dependent attackers to execute arbitrary code via a (1) file or (2) socket that provides configuration data with many entries, leading to a heap-based buffer overflow.
Integer overflow in the load_iface function in Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 might allow context-dependent attackers to execute arbitrary code via a (1) file or (2) socket that provides configuration data with many entries, leading to a heap-based buffer overflow.
Integer overflow in the load_iface function in Tools/gdomap.c in gdoma ...
Уязвимости операционной системы Gentoo Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS