[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2006-0459

Date: (C)2006-03-29   (M)2017-07-21
 
CVSS Score: 7.5Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











flex.skl in Will Estes and John Millaway Fast Lexical Analyzer Generator (flex) before 2.5.33 does not allocate enough memory for grammars containing (1) REJECT statements or (2) trailing context rules, which causes flex to generate code that contains a buffer overflow that might allow context-dependent attackers to execute arbitrary code.

Reference:
BID-16896
SECUNIA-19071
SECUNIA-19126
SECUNIA-19228
SECUNIA-19424
OSVDB-23440
SREASON-570
ADV-2006-0770
DSA-1020
GLSA-200603-07
USN-260-1
http://sourceforge.net/mailarchive/forum.php?thread_name=20060223020346.GA11231%40tabitha.home.tldz.org&forum_name=flex-announce
flex-bypass-security(24995)
http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download

CWE    1
CWE-119

© 2013 SecPod Technologies