Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454 - | |
References | () http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7 - | |
References | () http://www.openwall.com/lists/oss-security/2013/04/28/3 - |
07 Nov 2023, 02:09
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2014-06-02 15:55
Updated : 2024-11-21 01:34
NVD link : CVE-2011-5280
Mitre link : CVE-2011-5280
CVE.ORG link : CVE-2011-5280
JSON object : View
Products Affected
rom_walton
- boinc
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer