Integer overflow in the load_iface function in Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 might allow context-dependent attackers to execute arbitrary code via a (1) file or (2) socket that provides configuration data with many entries, leading to a heap-based buffer overflow.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz - Patch | |
References | () http://marc.info/?l=oss-security&m=127324274005709&w=2 - | |
References | () http://marc.info/?l=oss-security&m=127325778527537&w=2 - | |
References | () http://savannah.gnu.org/bugs/?29755 - | |
References | () http://secunia.com/advisories/39746 - Vendor Advisory | |
References | () http://thread.gmane.org/gmane.comp.lib.gnustep.bugs/12336 - Exploit | |
References | () https://bugs.launchpad.net/ubuntu/+source/gnustep-base/+bug/573108 - Exploit |
Information
Published : 2010-05-12 11:46
Updated : 2024-11-21 01:14
NVD link : CVE-2010-1620
Mitre link : CVE-2010-1620
CVE.ORG link : CVE-2010-1620
JSON object : View
Products Affected
gnustep
- gnustep_base
CWE
CWE-189
Numeric Errors