CVE-2012-4527

Stack-based buffer overflow in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file name. NOTE: it is not clear whether this is a vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mcrypt:mcrypt:*:*:*:*:*:*:*:*
cpe:2.3:a:mcrypt:mcrypt:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:mcrypt:mcrypt:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:mcrypt:mcrypt:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:mcrypt:mcrypt:2.6.7:*:*:*:*:*:*:*

History

21 Nov 2024, 01:43

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091173.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091173.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091206.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091206.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091377.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091377.html -
References () http://lists.opensuse.org/opensuse-updates/2012-11/msg00003.html - () http://lists.opensuse.org/opensuse-updates/2012-11/msg00003.html -
References () http://www.openwall.com/lists/oss-security/2012/10/18/12 - () http://www.openwall.com/lists/oss-security/2012/10/18/12 -
References () http://www.openwall.com/lists/oss-security/2012/10/18/9 - () http://www.openwall.com/lists/oss-security/2012/10/18/9 -
References () http://www.openwall.com/lists/oss-security/2012/11/20/1 - () http://www.openwall.com/lists/oss-security/2012/11/20/1 -
References () http://www.securityfocus.com/bid/56114 - () http://www.securityfocus.com/bid/56114 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=867790 - () https://bugzilla.redhat.com/show_bug.cgi?id=867790 -

07 Nov 2023, 02:11

Type Values Removed Values Added
Summary Stack-based buffer overflow in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file name. NOTE: it is not clear whether this is a vulnerability. Stack-based buffer overflow in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file name. NOTE: it is not clear whether this is a vulnerability.

Information

Published : 2012-11-21 23:55

Updated : 2024-11-21 01:43


NVD link : CVE-2012-4527

Mitre link : CVE-2012-4527

CVE.ORG link : CVE-2012-4527


JSON object : View

Products Affected

mcrypt

  • mcrypt
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer