Описание
Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.
Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2005-4807
- http://bugs.gentoo.org/show_bug.cgi?id=99464
- http://secunia.com/advisories/21508
- http://secunia.com/advisories/21530
- http://www.osvdb.org/27960
- http://www.securityfocus.com/bid/19555
- http://www.ubuntu.com/usn/usn-336-1
- http://www.vupen.com/english/advisories/2006/3307
Связанные уязвимости
Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.
Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.
Stack-based buffer overflow in the as_bad function in messages.c in th ...