[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-3971

Date: (C)2008-09-10   (M)2017-08-08
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Heap-based buffer overflow in the open_man_file function in callbacks.c in gmanedit 0.4.1 allows remote attackers to execute arbitrary code via a crafted man page, which is not properly handled during utf8 conversion. NOTE: another overflow was reported using a configuration file, but that vector does not have a scenario that crosses privilege boundaries.

Reference:
BID-31040
http://www.openwall.com/lists/oss-security/2008/09/06/2
http://www.openwall.com/lists/oss-security/2008/09/09/19
gmanedit-glocaletoutf8-bo(44963)
gmanedit-readconffromfile-bo(44962)
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=497835

CWE    1
CWE-119

© 2013 SecPod Technologies