Multiple buffer overflows in the POSIX readdir_r function, as used in multiple packages, allow local users to cause a denial of service and possibly execute arbitrary code via (1) a symlink attack that exploits a race condition between opendir and pathcon calls and changes the filesystem to one with a larger maximum directory-entry name length, or (2) possibly via programmer-introduced errors on operating systems with a small struct dirent, such as Solaris or BeOS, as demonstrated in packages including (a) gcj, (b) KDE, (c) libwww, (d) the Rudiments library, (e) teTeX, (f) xmail, (g) bfbtester, (h) ncftp, (i) netwib, (j) OpenOffice.org, (k) Pike, (l) reprepro, (m) Tcl, and (n) xgsmlib.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Multiple buffer overflows in the POSIX readdir_r function, as used in multiple packages, allow local users to cause a denial of service and possibly execute arbitrary code via (1) a symlink attack that exploits a race condition between opendir and pathcon calls and changes the filesystem to one with a larger maximum directory-entry name length, or (2) possibly via programmer-introduced errors on operating systems with a small struct dirent, such as Solaris or BeOS, as demonstrated in packages including (a) gcj, (b) KDE, (c) libwww, (d) the Rudiments library, (e) teTeX, (f) xmail, (g) bfbtester, (h) ncftp, (i) netwib, (j) OpenOffice.org, (k) Pike, (l) reprepro, (m) Tcl, and (n) xgsmlib.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/archive/1/416002/30/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://www.securityfocus.com/archive/1/415781 | mailing-list x_refsource_BUGTRAQ |
http://www.securityfocus.com/archive/1/415790/30/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://www.securityfocus.com/bid/15259 | vdb-entry x_refsource_BID |
http://www.securityfocus.com/archive/1/415999/30/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://www.securityfocus.com/archive/1/415998/30/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://www.securityfocus.com/archive/1/415995/30/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://womble.decadentplace.org.uk/readdir_r-advisory.html | x_refsource_MISC |
http://www.securityfocus.com/archive/1/416048/30/0/threaded | mailing-list x_refsource_BUGTRAQ |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/archive/1/416002/30/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.securityfocus.com/archive/1/415781 | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.securityfocus.com/archive/1/415790/30/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.securityfocus.com/bid/15259 | vdb-entry x_refsource_BID x_transferred |
http://www.securityfocus.com/archive/1/415999/30/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.securityfocus.com/archive/1/415998/30/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.securityfocus.com/archive/1/415995/30/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://womble.decadentplace.org.uk/readdir_r-advisory.html | x_refsource_MISC x_transferred |
http://www.securityfocus.com/archive/1/416048/30/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
Multiple buffer overflows in the POSIX readdir_r function, as used in multiple packages, allow local users to cause a denial of service and possibly execute arbitrary code via (1) a symlink attack that exploits a race condition between opendir and pathcon calls and changes the filesystem to one with a larger maximum directory-entry name length, or (2) possibly via programmer-introduced errors on operating systems with a small struct dirent, such as Solaris or BeOS, as demonstrated in packages including (a) gcj, (b) KDE, (c) libwww, (d) the Rudiments library, (e) teTeX, (f) xmail, (g) bfbtester, (h) ncftp, (i) netwib, (j) OpenOffice.org, (k) Pike, (l) reprepro, (m) Tcl, and (n) xgsmlib.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.6 | MEDIUM | AV:L/AC:H/Au:N/C:C/I:N/A:C |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |
This issue did not affect the Linux glibc.