Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file.
References
Configurations
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9 - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html - | |
References | () http://www.openwall.com/lists/oss-security/2013/04/28/3 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=957795 - |
07 Nov 2023, 02:18
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2014-06-02 15:55
Updated : 2024-11-21 02:00
NVD link : CVE-2013-7386
Mitre link : CVE-2013-7386
CVE.ORG link : CVE-2013-7386
JSON object : View
Products Affected
rom_walton
- boinc
CWE
CWE-134
Use of Externally-Controlled Format String