CVE-2005-3863

Stack-based buffer overflow in kkstrtext.h in ktools library 0.3 and earlier, as used in products such as (1) centericq, (2) orpheus, (3) motor, and (4) groan, allows local users or remote attackers to execute arbitrary code via a long parameter to the VGETSTRING macro.
References
Link Resource
http://secunia.com/advisories/17768 Vendor Advisory
http://secunia.com/advisories/18081 Patch Vendor Advisory
http://secunia.com/advisories/20329 Vendor Advisory
http://secunia.com/advisories/20368 Patch Vendor Advisory
http://secunia.com/advisories/20446 Patch Vendor Advisory
http://secunia.com/advisories/21684 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200512-11.xml
http://security.gentoo.org/glsa/glsa-200608-27.xml
http://www.debian.org/security/2006/dsa-1083 Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-1088 Patch Vendor Advisory
http://www.osvdb.org/21161
http://www.securityfocus.com/archive/1/417906/100/0/threaded
http://www.securityfocus.com/bid/15600
http://www.vupen.com/english/advisories/2005/2605 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2062 Vendor Advisory
http://www.zone-h.org/en/advisories/read/id=8480/ Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/23233
http://secunia.com/advisories/17768 Vendor Advisory
http://secunia.com/advisories/18081 Patch Vendor Advisory
http://secunia.com/advisories/20329 Vendor Advisory
http://secunia.com/advisories/20368 Patch Vendor Advisory
http://secunia.com/advisories/20446 Patch Vendor Advisory
http://secunia.com/advisories/21684 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200512-11.xml
http://security.gentoo.org/glsa/glsa-200608-27.xml
http://www.debian.org/security/2006/dsa-1083 Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-1088 Patch Vendor Advisory
http://www.osvdb.org/21161
http://www.securityfocus.com/archive/1/417906/100/0/threaded
http://www.securityfocus.com/bid/15600
http://www.vupen.com/english/advisories/2005/2605 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2062 Vendor Advisory
http://www.zone-h.org/en/advisories/read/id=8480/ Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/23233
Configurations

Configuration 1 (hide)

cpe:2.3:a:ktools:ktools:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:02

Type Values Removed Values Added
References () http://secunia.com/advisories/17768 - Vendor Advisory () http://secunia.com/advisories/17768 - Vendor Advisory
References () http://secunia.com/advisories/18081 - Patch, Vendor Advisory () http://secunia.com/advisories/18081 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20329 - Vendor Advisory () http://secunia.com/advisories/20329 - Vendor Advisory
References () http://secunia.com/advisories/20368 - Patch, Vendor Advisory () http://secunia.com/advisories/20368 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20446 - Patch, Vendor Advisory () http://secunia.com/advisories/20446 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21684 - Vendor Advisory () http://secunia.com/advisories/21684 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200512-11.xml - () http://security.gentoo.org/glsa/glsa-200512-11.xml -
References () http://security.gentoo.org/glsa/glsa-200608-27.xml - () http://security.gentoo.org/glsa/glsa-200608-27.xml -
References () http://www.debian.org/security/2006/dsa-1083 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-1083 - Patch, Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1088 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-1088 - Patch, Vendor Advisory
References () http://www.osvdb.org/21161 - () http://www.osvdb.org/21161 -
References () http://www.securityfocus.com/archive/1/417906/100/0/threaded - () http://www.securityfocus.com/archive/1/417906/100/0/threaded -
References () http://www.securityfocus.com/bid/15600 - () http://www.securityfocus.com/bid/15600 -
References () http://www.vupen.com/english/advisories/2005/2605 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2605 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/2062 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2062 - Vendor Advisory
References () http://www.zone-h.org/en/advisories/read/id=8480/ - Vendor Advisory () http://www.zone-h.org/en/advisories/read/id=8480/ - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/23233 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/23233 -

Information

Published : 2005-11-29 11:03

Updated : 2024-11-21 00:02


NVD link : CVE-2005-3863

Mitre link : CVE-2005-3863

CVE.ORG link : CVE-2005-3863


JSON object : View

Products Affected

ktools

  • ktools
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer