CVE-2008-1865

Stack-based buffer overflow in the msx_readnode function in libmosix.c in openmosix-tools (aka userspace-tools) in openMosix might allow local users to cause a denial of service (application crash) via a third-party program that calls this function with a long item argument. NOTE: the vendor does not provide any program that is capable of causing this overflow.
Configurations

Configuration 1 (hide)

cpe:2.3:o:openmosix_project:openmosix:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:45

Type Values Removed Values Added
References () http://securityreason.com/securityalert/3813 - () http://securityreason.com/securityalert/3813 -
References () http://www.securityfocus.com/archive/1/490534/100/0/threaded - () http://www.securityfocus.com/archive/1/490534/100/0/threaded -
References () http://www.securityfocus.com/bid/28663 - () http://www.securityfocus.com/bid/28663 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41691 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41691 -

Information

Published : 2008-04-17 19:05

Updated : 2024-11-21 00:45


NVD link : CVE-2008-1865

Mitre link : CVE-2008-1865

CVE.ORG link : CVE-2008-1865


JSON object : View

Products Affected

openmosix_project

  • openmosix
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer