flex.skl in Will Estes and John Millaway Fast Lexical Analyzer Generator (flex) before 2.5.33 does not allocate enough memory for grammars containing (1) REJECT statements or (2) trailing context rules, which causes flex to generate code that contains a buffer overflow that might allow context-dependent attackers to execute arbitrary code.
References
Configurations
History
21 Nov 2024, 00:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download - Product | |
References | () http://secunia.com/advisories/19071 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/19126 - Vendor Advisory | |
References | () http://secunia.com/advisories/19228 - Vendor Advisory | |
References | () http://secunia.com/advisories/19424 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/570 - Third Party Advisory | |
References | () http://sourceforge.net/mailarchive/forum.php?thread_name=20060223020346.GA11231%40tabitha.home.tldz.org&forum_name=flex-announce - Release Notes | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml - Third Party Advisory | |
References | () http://www.osvdb.org/23440 - Broken Link, Patch | |
References | () http://www.securityfocus.com/bid/16896 - Patch, Third Party Advisory, VDB Entry | |
References | () http://www.us.debian.org/security/2006/dsa-1020 - Patch, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/0770 - Broken Link, URL Repurposed | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24995 - VDB Entry | |
References | () https://usn.ubuntu.com/260-1/ - Third Party Advisory |
06 Oct 2023, 17:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:will_estes_and_john_millaway:flex:2.5.30:*:*:*:*:*:*:* |
cpe:2.3:a:westes:flex:*:*:*:*:*:*:*:* |
References | (BID) http://www.securityfocus.com/bid/16896 - Patch, Third Party Advisory, VDB Entry | |
References | (SREASON) http://securityreason.com/securityalert/570 - Third Party Advisory | |
References | (OSVDB) http://www.osvdb.org/23440 - Broken Link, Patch | |
References | (CONFIRM) http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download - Product | |
References | (MLIST) http://sourceforge.net/mailarchive/forum.php?thread_name=20060223020346.GA11231%40tabitha.home.tldz.org&forum_name=flex-announce - Release Notes | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/24995 - VDB Entry | |
References | (UBUNTU) https://usn.ubuntu.com/260-1/ - Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2006/0770 - Broken Link, URL Repurposed | |
References | (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml - Third Party Advisory | |
First Time |
Westes
Westes flex |
Information
Published : 2006-03-29 23:02
Updated : 2024-11-21 00:06
NVD link : CVE-2006-0459
Mitre link : CVE-2006-0459
CVE.ORG link : CVE-2006-0459
JSON object : View
Products Affected
westes
- flex
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer