CVE-2008-2363

The PartsBatch class in Pan 0.132 and earlier does not properly manage the data structures for Parts batches, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted .nzb file that triggers a heap-based buffer overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pan:pan:*:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.105:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.106:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.107:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.108:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.109:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.110:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.111:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.112:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.113:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.114:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.115:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.116:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.117:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.118:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.119:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.120:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.121:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.122:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.123:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.124:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.125:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.126:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.127:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.128:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.129:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.130:*:*:*:*:*:*:*
cpe:2.3:a:pan:pan:0.131:*:*:*:*:*:*:*

History

21 Nov 2024, 00:46

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=224051 - Patch () http://bugs.gentoo.org/show_bug.cgi?id=224051 - Patch
References () http://bugzilla.gnome.org/show_bug.cgi?id=535413 - Patch () http://bugzilla.gnome.org/show_bug.cgi?id=535413 - Patch
References () http://marc.info/?l=oss-security&m=121207185600564&w=2 - Patch () http://marc.info/?l=oss-security&m=121207185600564&w=2 - Patch
References () http://secunia.com/advisories/30717 - Vendor Advisory () http://secunia.com/advisories/30717 - Vendor Advisory
References () http://secunia.com/advisories/31315 - Vendor Advisory () http://secunia.com/advisories/31315 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200807-15.xml - () http://security.gentoo.org/glsa/glsa-200807-15.xml -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:201 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:201 -
References () http://www.novell.com/linux/security/advisories/2008_13_sr.html - () http://www.novell.com/linux/security/advisories/2008_13_sr.html -
References () http://www.securityfocus.com/bid/29421 - Patch () http://www.securityfocus.com/bid/29421 - Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=446902 - () https://bugzilla.redhat.com/show_bug.cgi?id=446902 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/42750 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/42750 -

Information

Published : 2008-06-02 21:30

Updated : 2024-11-21 00:46


NVD link : CVE-2008-2363

Mitre link : CVE-2008-2363

CVE.ORG link : CVE-2008-2363


JSON object : View

Products Affected

pan

  • pan
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer