Описание
Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow context-dependent attackers to execute arbitrary code via (1) a long argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or (4) WNDBVERSION environment variable; or (5) a user-supplied dictionary (aka data file). NOTE: since WordNet itself does not run with special privileges, this issue only crosses privilege boundaries when WordNet is invoked as a third party component.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | released | 1:3.0-11ubuntu0.1 |
feisty | released | 1:2.1-4ubuntu0.1 |
gutsy | ignored | end of life, was needed |
hardy | released | 1:3.0-6ubuntu0.1 |
intrepid | released | 1:3.0-11ubuntu0.1 |
jaunty | released | 1:3.0-11ubuntu0.1 |
karmic | released | 1:3.0-11ubuntu0.1 |
upstream | released | 1:3.0-13 |
Показывать по
Ссылки на источники
10 Critical
CVSS2
Связанные уязвимости
Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow context-dependent attackers to execute arbitrary code via (1) a long argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or (4) WNDBVERSION environment variable; or (5) a user-supplied dictionary (aka data file). NOTE: since WordNet itself does not run with special privileges, this issue only crosses privilege boundaries when WordNet is invoked as a third party component.
Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow context- ...
Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow context-dependent attackers to execute arbitrary code via (1) a long argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or (4) WNDBVERSION environment variable; or (5) a user-supplied dictionary (aka data file). NOTE: since WordNet itself does not run with special privileges, this issue only crosses privilege boundaries when WordNet is invoked as a third party component.
10 Critical
CVSS2