Heap-based buffer overflow in the open_man_file function in callbacks.c in gmanedit 0.4.1 allows remote attackers to execute arbitrary code via a crafted man page, which is not properly handled during utf8 conversion. NOTE: another overflow was reported using a configuration file, but that vector does not have a scenario that crosses privilege boundaries.
References
Configurations
History
21 Nov 2024, 00:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=497835 - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2008/09/06/2 - | |
References | () http://www.openwall.com/lists/oss-security/2008/09/09/13 - | |
References | () http://www.openwall.com/lists/oss-security/2008/09/09/19 - | |
References | () http://www.securityfocus.com/bid/31040 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44962 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44963 - |
Information
Published : 2008-09-11 01:13
Updated : 2024-11-21 00:50
NVD link : CVE-2008-3971
Mitre link : CVE-2008-3971
CVE.ORG link : CVE-2008-3971
JSON object : View
Products Affected
gmanedit2
- gmanedit
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer