Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-3196

Опубликовано: 08 июл. 2008
Источник: redhat
EPSS Низкий

Описание

skeleton.c in yacc does not properly handle reduction of a rule with an empty right hand side, which allows context-dependent attackers to cause an out-of-bounds stack access when the yacc stack pointer points to the end of the stack.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 3byaccWill not fix
Red Hat Enterprise Linux 4byaccWill not fix
Red Hat Enterprise Linux 5byaccWill not fix

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=455031byacc: Potential out of bounds of allocated stack access

EPSS

Процентиль: 65%
0.00486
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

skeleton.c in yacc does not properly handle reduction of a rule with an empty right hand side, which allows context-dependent attackers to cause an out-of-bounds stack access when the yacc stack pointer points to the end of the stack.

nvd
больше 17 лет назад

skeleton.c in yacc does not properly handle reduction of a rule with an empty right hand side, which allows context-dependent attackers to cause an out-of-bounds stack access when the yacc stack pointer points to the end of the stack.

debian
больше 17 лет назад

skeleton.c in yacc does not properly handle reduction of a rule with a ...

github
больше 3 лет назад

skeleton.c in yacc does not properly handle reduction of a rule with an empty right hand side, which allows context-dependent attackers to cause an out-of-bounds stack access when the yacc stack pointer points to the end of the stack.

EPSS

Процентиль: 65%
0.00486
Низкий