Computer Security
[EN] securityvulns.ru no-pyccku


plib / TORCS buffer overflow
Published:09.03.2012
Source:
SecurityVulns ID:12225
Type:library
Threat Level:
5/10
Description:Buffer overflow on error messages processing.
Affected:PLIB : plib 1.8
 TORCS : TORCS 1.3
CVE:CVE-2011-4620 (Buffer overflow in the ulSetError function in util/ulError.cxx in PLIB 1.8.5, as used in TORCS 1.3.1 and other products, allows user-assisted remote attackers to execute arbitrary code via vectors involving a long error message, as demonstrated by a crafted acc file for TORCS. NOTE: some of these details are obtained from third party information.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2425-1] plib security update (09.03.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod