CVE-2006-0459

flex.skl in Will Estes and John Millaway Fast Lexical Analyzer Generator (flex) before 2.5.33 does not allocate enough memory for grammars containing (1) REJECT statements or (2) trailing context rules, which causes flex to generate code that contains a buffer overflow that might allow context-dependent attackers to execute arbitrary code.
References
Link Resource
http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download Product
http://secunia.com/advisories/19071 Patch Vendor Advisory
http://secunia.com/advisories/19126 Vendor Advisory
http://secunia.com/advisories/19228 Vendor Advisory
http://secunia.com/advisories/19424 Patch Vendor Advisory
http://securityreason.com/securityalert/570 Third Party Advisory
http://sourceforge.net/mailarchive/forum.php?thread_name=20060223020346.GA11231%40tabitha.home.tldz.org&forum_name=flex-announce Release Notes
http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml Third Party Advisory
http://www.osvdb.org/23440 Broken Link Patch
http://www.securityfocus.com/bid/16896 Patch Third Party Advisory VDB Entry
http://www.us.debian.org/security/2006/dsa-1020 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2006/0770 Broken Link URL Repurposed
https://exchange.xforce.ibmcloud.com/vulnerabilities/24995 VDB Entry
https://usn.ubuntu.com/260-1/ Third Party Advisory
http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download Product
http://secunia.com/advisories/19071 Patch Vendor Advisory
http://secunia.com/advisories/19126 Vendor Advisory
http://secunia.com/advisories/19228 Vendor Advisory
http://secunia.com/advisories/19424 Patch Vendor Advisory
http://securityreason.com/securityalert/570 Third Party Advisory
http://sourceforge.net/mailarchive/forum.php?thread_name=20060223020346.GA11231%40tabitha.home.tldz.org&forum_name=flex-announce Release Notes
http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml Third Party Advisory
http://www.osvdb.org/23440 Broken Link Patch
http://www.securityfocus.com/bid/16896 Patch Third Party Advisory VDB Entry
http://www.us.debian.org/security/2006/dsa-1020 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2006/0770 Broken Link URL Repurposed
https://exchange.xforce.ibmcloud.com/vulnerabilities/24995 VDB Entry
https://usn.ubuntu.com/260-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:westes:flex:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:06

Type Values Removed Values Added
References () http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download - Product () http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download - Product
References () http://secunia.com/advisories/19071 - Patch, Vendor Advisory () http://secunia.com/advisories/19071 - Patch, Vendor Advisory
References () http://secunia.com/advisories/19126 - Vendor Advisory () http://secunia.com/advisories/19126 - Vendor Advisory
References () http://secunia.com/advisories/19228 - Vendor Advisory () http://secunia.com/advisories/19228 - Vendor Advisory
References () http://secunia.com/advisories/19424 - Patch, Vendor Advisory () http://secunia.com/advisories/19424 - Patch, Vendor Advisory
References () http://securityreason.com/securityalert/570 - Third Party Advisory () http://securityreason.com/securityalert/570 - Third Party Advisory
References () http://sourceforge.net/mailarchive/forum.php?thread_name=20060223020346.GA11231%40tabitha.home.tldz.org&forum_name=flex-announce - Release Notes () http://sourceforge.net/mailarchive/forum.php?thread_name=20060223020346.GA11231%40tabitha.home.tldz.org&forum_name=flex-announce - Release Notes
References () http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml - Third Party Advisory () http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml - Third Party Advisory
References () http://www.osvdb.org/23440 - Broken Link, Patch () http://www.osvdb.org/23440 - Broken Link, Patch
References () http://www.securityfocus.com/bid/16896 - Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/16896 - Patch, Third Party Advisory, VDB Entry
References () http://www.us.debian.org/security/2006/dsa-1020 - Patch, Vendor Advisory () http://www.us.debian.org/security/2006/dsa-1020 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/0770 - Broken Link, URL Repurposed () http://www.vupen.com/english/advisories/2006/0770 - Broken Link, URL Repurposed
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24995 - VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/24995 - VDB Entry
References () https://usn.ubuntu.com/260-1/ - Third Party Advisory () https://usn.ubuntu.com/260-1/ - Third Party Advisory

06 Oct 2023, 17:23

Type Values Removed Values Added
CPE cpe:2.3:a:will_estes_and_john_millaway:flex:*:*:*:*:*:*:*:*
cpe:2.3:a:will_estes_and_john_millaway:flex:2.5.30:*:*:*:*:*:*:*
cpe:2.3:a:westes:flex:*:*:*:*:*:*:*:*
References (BID) http://www.securityfocus.com/bid/16896 - Patch (BID) http://www.securityfocus.com/bid/16896 - Patch, Third Party Advisory, VDB Entry
References (SREASON) http://securityreason.com/securityalert/570 - (SREASON) http://securityreason.com/securityalert/570 - Third Party Advisory
References (OSVDB) http://www.osvdb.org/23440 - Patch (OSVDB) http://www.osvdb.org/23440 - Broken Link, Patch
References (CONFIRM) http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download - (CONFIRM) http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download - Product
References (MLIST) http://sourceforge.net/mailarchive/forum.php?thread_name=20060223020346.GA11231%40tabitha.home.tldz.org&forum_name=flex-announce - (MLIST) http://sourceforge.net/mailarchive/forum.php?thread_name=20060223020346.GA11231%40tabitha.home.tldz.org&forum_name=flex-announce - Release Notes
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/24995 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/24995 - VDB Entry
References (UBUNTU) https://usn.ubuntu.com/260-1/ - (UBUNTU) https://usn.ubuntu.com/260-1/ - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2006/0770 - (VUPEN) http://www.vupen.com/english/advisories/2006/0770 - Broken Link, URL Repurposed
References (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml - (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml - Third Party Advisory
First Time Westes
Westes flex

Information

Published : 2006-03-29 23:02

Updated : 2024-11-21 00:06


NVD link : CVE-2006-0459

Mitre link : CVE-2006-0459

CVE.ORG link : CVE-2006-0459


JSON object : View

Products Affected

westes

  • flex
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer