WordNet Multiple Buffer Overflow Vulnerabilities
BID:30958
Info
WordNet Multiple Buffer Overflow Vulnerabilities
| Bugtraq ID: | 30958 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2008-3908 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 01 2008 12:00AM |
| Updated: | Oct 07 2008 07:38PM |
| Credit: | Rob Holland, oCERT Team |
| Vulnerable: |
Princeton University WordNet 3.0 Mandriva Linux Mandrake 2008.1 x86_64 Mandriva Linux Mandrake 2008.1 Mandriva Linux Mandrake 2008.0 x86_64 Mandriva Linux Mandrake 2008.0 Gentoo Linux |
| Not Vulnerable: | |
Discussion
WordNet Multiple Buffer Overflow Vulnerabilities
WordNet is prone to multiple buffer-overflow vulnerabilities because the application fails to properly bounds-check user-supplied input. Specifically, the issues arise from handling command-line arguments, environment variables, and data read from user-supplied dictionaries.
Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely result in a denial of service.
The issues affect WordNet 3.0; other versions may also be vulnerable.
WordNet is prone to multiple buffer-overflow vulnerabilities because the application fails to properly bounds-check user-supplied input. Specifically, the issues arise from handling command-line arguments, environment variables, and data read from user-supplied dictionaries.
Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely result in a denial of service.
The issues affect WordNet 3.0; other versions may also be vulnerable.
Exploit / POC
WordNet Multiple Buffer Overflow Vulnerabilities
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
WordNet Multiple Buffer Overflow Vulnerabilities
Solution:
Fixes are available. Please see the references for more information.
Mandriva Linux Mandrake 2008.1 x86_64
Mandriva Linux Mandrake 2008.0 x86_64
Mandriva Linux Mandrake 2008.1
Mandriva Linux Mandrake 2008.0
Solution:
Fixes are available. Please see the references for more information.
Mandriva Linux Mandrake 2008.1 x86_64
-
Mandriva lib64wordnet3.0-3.0-6.2mdv2008.1.x86_64.rpm
http://www.mandriva.com/en/download/ -
Mandriva lib64wordnet3.0-devel-3.0-6.2mdv2008.1.x86_64.rpm
http://www.mandriva.com/en/download/ -
Mandriva wordnet-3.0-6.2mdv2008.1.x86_64.rpm
http://www.mandriva.com/en/download/
Mandriva Linux Mandrake 2008.0 x86_64
-
Mandriva lib64wordnet3.0-3.0-6.2mdv2008.0.x86_64.rpm
http://www.mandriva.com/en/download/ -
Mandriva lib64wordnet3.0-devel-3.0-6.2mdv2008.0.x86_64.rpm
http://www.mandriva.com/en/download/ -
Mandriva wordnet-3.0-6.2mdv2008.0.x86_64.rpm
http://www.mandriva.com/en/download/
Mandriva Linux Mandrake 2008.1
-
Mandriva libwordnet3.0-3.0-6.2mdv2008.1.i586.rpm
http://www.mandriva.com/en/download/ -
Mandriva libwordnet3.0-devel-3.0-6.2mdv2008.1.i586.rpm
http://www.mandriva.com/en/download/ -
Mandriva wordnet-3.0-6.2mdv2008.1.i586.rpm
http://www.mandriva.com/en/download/
Mandriva Linux Mandrake 2008.0
-
Mandriva libwordnet3.0-3.0-6.2mdv2008.0.i586.rpm
http://www.mandriva.com/en/download/ -
Mandriva libwordnet3.0-devel-3.0-6.2mdv2008.0.i586.rpm
http://www.mandriva.com/en/download/ -
Mandriva wordnet-3.0-6.2mdv2008.0.i586.rpm
http://www.mandriva.com/en/download/
References
WordNet Multiple Buffer Overflow Vulnerabilities
References:
References:
- #2008-014 WordNet stack and heap overflows (oCERT)
- WordNet Homepage (Princeton University)
- WordNet-3.0 Audit (oCERT)
- [oCERT-2008-014] WordNet stack and heap overflows (Rob Holland
)