CVE-2006-0459

Summary

CVECVE-2006-0459
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2006-03-29 23:02:00 UTC
Updated2023-10-06 17:23:00 UTC
Descriptionflex.skl in Will Estes and John Millaway Fast Lexical Analyzer Generator (flex) before 2.5.33 does not allocate enough memory for grammars containing (1) REJECT statements or (2) trailing context rules, which causes flex to generate code that contains a buffer overflow that might allow context-dependent attackers to execute arbitrary code.

Risk And Classification

Problem Types: CWE-119

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Westes Flex All All All All
Application Will Estes And John Millaway Flex 2.5.30 All All All
Application Will Estes And John Millaway Flex 2.5.30 All All All
Application Will Estes And John Millaway Flex All All All All

References

ReferenceSourceLinkTags
Gentoo Linux Documentation -- flex: Potential insecure code generation GENTOO www.gentoo.org
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com
Flex Code Generation Buffer Overflow Vulnerability BID www.securityfocus.com Patch
Secunia - Advisories - Debian update for flex SECUNIA secunia.com Patch, Vendor Advisory
flex: the fast lexical analyser / Thread: [Flex-announce] flex 2.5.33 released MLIST sourceforge.net
Gentoo update for flex - Advisories - Secunia SECUNIA secunia.com Vendor Advisory
flex: the fast lexical analyser - Browse Files at SourceForge.net CONFIRM prdownloads.sourceforge.net
DSA-1020 DEBIAN www.us.debian.org Patch, Vendor Advisory
Webmail - OVH VUPEN www.vupen.com
Secunia - Advisories - Flex Generated C Parsers Buffer Overflow Vulnerability SECUNIA secunia.com Patch, Vendor Advisory
Ubuntu update for flex / gpc - Advisories - Secunia SECUNIA secunia.com Vendor Advisory
23440 OSVDB www.osvdb.org Patch
SecurityReason SREASON securityreason.com
USN-260-1: flex vulnerability | Ubuntu security notices UBUNTU usn.ubuntu.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

OrganizationPublishedContributorStatement
Red Hat2006-08-16Mark J CoxThis issue only affects parsers which are generated by grammars which either use REJECT or rules with a variable trailing context (in these rules the parser has to keep all backtracking paths). The Red Hat Security Response Team analysed all packages that include flex generated parsers in Red Hat Enterprise Linux (2.1, 3, and 4) and found none were vulnerable.
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report