Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4EF2572B.4050506@redhat.com>
Date: Wed, 21 Dec 2011 15:01:15 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: plib ulSetError() buffer overflow - CVE-2011-4620

https://secunia.com/advisories/47297/
http://plib.sourceforge.net/index.html
http://www.exploit-db.com/exploits/18258/

 From Secunia:

======================
*Description*
A vulnerability has been discovered in PLIB, which can be exploited by 
malicious people to compromise an application using the library.

The vulnerability is caused due to a boundary error within the 
"ulSetError()" function (src/util/ulError.cxx) when creating the error 
message, which can be exploited to overflow a static buffer.

Successful exploitation allows the execution of arbitrary code but 
requires that the attacker can e.g. control the content of an overly 
long error message passed to the "ulSetError()" function.

The vulnerability is confirmed in version 1.8.5. Other versions may also 
be affected.
======================

Please use CVE-2011-4620 for this issue.

-- 

-Kurt Seifried / Red Hat Security Response Team


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.