[Secure-testing-team] Bug#481186: CVE-2008-2149: buffer overflows

Andreas Tille tillea at rki.de
Thu May 15 12:46:57 UTC 2008


On Wed, 14 May 2008, Steffen Joeris wrote:

> CVE-2008-2149:
>
> Stack-based buffer overflow in the searchwn function in Wordnet 2.0,
> 2.1, and 3.0 might allow context-dependent attackers to execute
> arbitrary code via a long command line option. NOTE: this issue probably
> does not cross privilege boundaries except in cases in which Wordnet is
> used as a back end.
>
> More information can be found in the gentoo bugreport(1).

As stated in the Gentoo BTS

    https://bugs.gentoo.org/show_bug.cgi?id=211491

there are potentially more issues of other sprintf()/strcpy()/strcat()/...
occurences.  So I wonder if you accept the attached patch as a fix for
the problem.  It actually cures the long command line option problem but
not more.

Kind regards

         Andreas.

-- 
http://fam-tille.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 50_CVE-2008-2149_buffer_overflows.patch
Type: text/x-diff
Size: 463 bytes
Desc: 
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20080515/d7293c34/attachment.patch 


More information about the Secure-testing-team mailing list