Computer Security
[EN] securityvulns.ru no-pyccku


LibSMI ibrary code execution
Published:24.10.2010
Source:
SecurityVulns ID:11212
Type:library
Threat Level:
5/10
Description:Buffer overflow on oversized numerical OID.
Affected:LIBSMI : libsmi 0.4
CVE:CVE-2010-2891 (Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.)
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, [CORE-2010-0819] LibSMI smiGetNode Buffer Overflow When Long OID Is Given In Numerical Form (24.10.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod