Computer Security
[EN] no-pyccku

LibSMI ibrary code execution
SecurityVulns ID:11212
Threat Level:
Description:Buffer overflow on oversized numerical OID.
Affected:LIBSMI : libsmi 0.4
CVE:CVE-2010-2891 (Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.)
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, [CORE-2010-0819] LibSMI smiGetNode Buffer Overflow When Long OID Is Given In Numerical Form (24.10.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod