Vulnerability CVE-2010-2947


Published: 2010-08-24   Modified: 2012-02-13

Description:
Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a string that is inconsistent with the expected number of fields.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Jan engelhardt -> Libhx 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=625866
http://www.vupen.com/english/advisories/2010/2232
http://www.securityfocus.com/bid/42592
http://www.openwall.com/lists/oss-security/2010/08/20/5
http://www.openwall.com/lists/oss-security/2010/08/20/12
http://www.mandriva.com/security/advisories?name=MDVSA-2010:165
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx;a=commit;h=904a46f90dd3f046bfac0b64a5e813d7cd4fca59

Copyright 2024, cxsecurity.com

 

Back to Top