CVE-2016-6354

Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:westes:flex:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:55

Type Values Removed Values Added
References () http://www.debian.org/security/2016/dsa-3653 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3653 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/07/18/8 - Release Notes, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/07/18/8 - Release Notes, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/07/26/12 - Release Notes, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/07/26/12 - Release Notes, Third Party Advisory
References () https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466 - Patch () https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466 - Patch
References () https://security.gentoo.org/glsa/201701-31 - () https://security.gentoo.org/glsa/201701-31 -

06 Oct 2023, 17:12

Type Values Removed Values Added
First Time Westes
Westes flex
CPE cpe:2.3:a:flex_project:flex:*:*:*:*:*:*:*:* cpe:2.3:a:westes:flex:*:*:*:*:*:*:*:*

Information

Published : 2016-09-21 14:25

Updated : 2024-11-21 02:55


NVD link : CVE-2016-6354

Mitre link : CVE-2016-6354

CVE.ORG link : CVE-2016-6354


JSON object : View

Products Affected

debian

  • debian_linux

westes

  • flex
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer