Vulnerability CVE-2006-0459


Published: 2006-03-29   Modified: 2012-02-12

Description:
flex.skl in Will Estes and John Millaway Fast Lexical Analyzer Generator (flex) before 2.5.33 does not allocate enough memory for grammars containing (1) REJECT statements or (2) trailing context rules, which causes flex to generate code that contains a buffer overflow that might allow context-dependent attackers to execute arbitrary code.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
flex: Potential insecure code generation
Thierry Carrez
11.03.2006

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Will estes and john millaway -> FLEX 

 References:
http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download
http://securityreason.com/securityalert/570
http://sourceforge.net/mailarchive/forum.php?thread_name=20060223020346.GA11231%40tabitha.home.tldz.org&forum_name=flex-announce
http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml
http://www.securityfocus.com/bid/16896
http://www.us.debian.org/security/2006/dsa-1020
http://www.vupen.com/english/advisories/2006/0770
https://exchange.xforce.ibmcloud.com/vulnerabilities/24995
https://usn.ubuntu.com/260-1/

Copyright 2024, cxsecurity.com

 

Back to Top