CVE-2012-6089

Multiple stack-based buffer overflows in the canoniseFileName function in os/pl-os.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:swi-prolog:swi-prolog:*:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.50:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.51:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.52:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.53:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.54:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.55:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.56:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.57:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.58:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.59:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.61:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.62:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.63:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.6.64:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.8.0:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.8.1:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.8.2:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.8.3:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.10.0:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.10.1:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.10.2:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.10.3:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.10.4:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:5.10.5:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.2.2:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.2.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:swi-prolog:swi-prolog:6.3.0:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.3.1:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.3.2:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.3.3:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.3.4:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.3.5:*:*:*:*:*:*:*
cpe:2.3:a:swi-prolog:swi-prolog:6.3.6:*:*:*:*:*:*:*

History

21 Nov 2024, 01:45

Type Values Removed Values Added
References () http://openwall.com/lists/oss-security/2013/01/03/7 - () http://openwall.com/lists/oss-security/2013/01/03/7 -
References () http://www.swi-prolog.org/git/pl.git/commit/a9a6fc8a2a9cf3b9154b490a4b1ffaa8be4d723c - Patch () http://www.swi-prolog.org/git/pl.git/commit/a9a6fc8a2a9cf3b9154b490a4b1ffaa8be4d723c - Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=891577 - () https://bugzilla.redhat.com/show_bug.cgi?id=891577 -
References () https://lists.iai.uni-bonn.de/pipermail/swi-prolog/2012/009428.html - Vendor Advisory () https://lists.iai.uni-bonn.de/pipermail/swi-prolog/2012/009428.html - Vendor Advisory

Information

Published : 2013-01-04 11:52

Updated : 2024-11-21 01:45


NVD link : CVE-2012-6089

Mitre link : CVE-2012-6089

CVE.ORG link : CVE-2012-6089


JSON object : View

Products Affected

swi-prolog

  • swi-prolog
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer