Stack-based buffer overflow in kkstrtext.h in ktools library 0.3 and earlier, as used in products such as (1) centericq, (2) orpheus, (3) motor, and (4) groan, allows local users or remote attackers to execute arbitrary code via a long parameter to the VGETSTRING macro.
References
Configurations
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/17768 - Vendor Advisory | |
References | () http://secunia.com/advisories/18081 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/20329 - Vendor Advisory | |
References | () http://secunia.com/advisories/20368 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/20446 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/21684 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200512-11.xml - | |
References | () http://security.gentoo.org/glsa/glsa-200608-27.xml - | |
References | () http://www.debian.org/security/2006/dsa-1083 - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2006/dsa-1088 - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/21161 - | |
References | () http://www.securityfocus.com/archive/1/417906/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/15600 - | |
References | () http://www.vupen.com/english/advisories/2005/2605 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/2062 - Vendor Advisory | |
References | () http://www.zone-h.org/en/advisories/read/id=8480/ - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/23233 - |
Information
Published : 2005-11-29 11:03
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3863
Mitre link : CVE-2005-3863
CVE.ORG link : CVE-2005-3863
JSON object : View
Products Affected
ktools
- ktools
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer