CVE-2008-3389

Stack-based buffer overflow in the libbecompat library in Ingres 2.6, Ingres 2006 release 1 (aka 9.0.4), and Ingres 2006 release 2 (aka 9.1.0) on Linux and HP-UX allows local users to gain privileges by setting a long value of an environment variable before running (1) verifydb, (2) iimerge, or (3) csreport.
References
Link Resource
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=732 Broken Link
http://secunia.com/advisories/31357 Third Party Advisory
http://secunia.com/advisories/31398 Third Party Advisory
http://securitytracker.com/id?1020615 Third Party Advisory VDB Entry
http://www.ingres.com/support/security-alert-080108.php Broken Link
http://www.securityfocus.com/archive/1/495177/100/0/threaded
http://www.securityfocus.com/bid/30512 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2292 Third Party Advisory
http://www.vupen.com/english/advisories/2008/2313 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/44179 Third Party Advisory VDB Entry
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=181989 Broken Link
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=732 Broken Link
http://secunia.com/advisories/31357 Third Party Advisory
http://secunia.com/advisories/31398 Third Party Advisory
http://securitytracker.com/id?1020615 Third Party Advisory VDB Entry
http://www.ingres.com/support/security-alert-080108.php Broken Link
http://www.securityfocus.com/archive/1/495177/100/0/threaded
http://www.securityfocus.com/bid/30512 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2292 Third Party Advisory
http://www.vupen.com/english/advisories/2008/2313 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/44179 Third Party Advisory VDB Entry
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=181989 Broken Link
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
OR cpe:2.3:a:ingres:ingres:2.6:*:*:*:*:*:*:*
cpe:2.3:a:ingres:ingres:2006:9.0.4:*:*:*:*:*:*
cpe:2.3:a:ingres:ingres:2006:9.1.0:*:*:*:*:*:*

History

21 Nov 2024, 00:49

Type Values Removed Values Added
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=732 - Broken Link () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=732 - Broken Link
References () http://secunia.com/advisories/31357 - Third Party Advisory () http://secunia.com/advisories/31357 - Third Party Advisory
References () http://secunia.com/advisories/31398 - Third Party Advisory () http://secunia.com/advisories/31398 - Third Party Advisory
References () http://securitytracker.com/id?1020615 - Third Party Advisory, VDB Entry () http://securitytracker.com/id?1020615 - Third Party Advisory, VDB Entry
References () http://www.ingres.com/support/security-alert-080108.php - Broken Link () http://www.ingres.com/support/security-alert-080108.php - Broken Link
References () http://www.securityfocus.com/archive/1/495177/100/0/threaded - () http://www.securityfocus.com/archive/1/495177/100/0/threaded -
References () http://www.securityfocus.com/bid/30512 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/30512 - Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2008/2292 - Third Party Advisory () http://www.vupen.com/english/advisories/2008/2292 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2008/2313 - Third Party Advisory () http://www.vupen.com/english/advisories/2008/2313 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44179 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/44179 - Third Party Advisory, VDB Entry
References () https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=181989 - Broken Link () https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=181989 - Broken Link

Information

Published : 2008-08-05 19:41

Updated : 2024-11-21 00:49


NVD link : CVE-2008-3389

Mitre link : CVE-2008-3389

CVE.ORG link : CVE-2008-3389


JSON object : View

Products Affected

linux

  • linux_kernel

hp

  • hp-ux

ingres

  • ingres
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer