Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-1367

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-17 Mar, 2008 | 23:00
Updated At-07 Aug, 2024 | 08:17
Rejected At-
Credits

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:17 Mar, 2008 | 23:00
Updated At:07 Aug, 2024 | 08:17
Rejected At:
▼CVE Numbering Authority (CNA)

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/30962
third-party-advisory
x_refsource_SECUNIA
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html
mailing-list
x_refsource_MLIST
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html
mailing-list
x_refsource_MLIST
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html
mailing-list
x_refsource_MLIST
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058
x_refsource_CONFIRM
http://lkml.org/lkml/2008/3/5/207
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/30850
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30116
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0233.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/30110
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
vendor-advisory
x_refsource_SUSE
http://www.vupen.com/english/advisories/2008/2222/references
vdb-entry
x_refsource_VUPEN
http://marc.info/?l=git-commits-head&m=120492000901739&w=2
mailing-list
x_refsource_MLIST
http://www.securityfocus.com/bid/29084
vdb-entry
x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/41340
vdb-entry
x_refsource_XF
https://bugzilla.redhat.com/show_bug.cgi?id=437312
x_refsource_CONFIRM
http://lwn.net/Articles/272048/#Comments
x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2008-0211.html
vendor-advisory
x_refsource_REDHAT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/30890
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2008-0508.html
vendor-advisory
x_refsource_REDHAT
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
mailing-list
x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
vendor-advisory
x_refsource_SUSE
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51
x_refsource_CONFIRM
http://secunia.com/advisories/31246
third-party-advisory
x_refsource_SECUNIA
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/30818
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/30962
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058
Resource:
x_refsource_CONFIRM
Hyperlink: http://lkml.org/lkml/2008/3/5/207
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/30850
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30116
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0233.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/30110
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.vupen.com/english/advisories/2008/2222/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://marc.info/?l=git-commits-head&m=120492000901739&w=2
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.securityfocus.com/bid/29084
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/41340
Resource:
vdb-entry
x_refsource_XF
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=437312
Resource:
x_refsource_CONFIRM
Hyperlink: http://lwn.net/Articles/272048/#Comments
Resource:
x_refsource_MISC
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0211.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/30890
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0508.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000023.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31246
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/30818
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/30962
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html
mailing-list
x_refsource_MLIST
x_transferred
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html
mailing-list
x_refsource_MLIST
x_transferred
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html
mailing-list
x_refsource_MLIST
x_transferred
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058
x_refsource_CONFIRM
x_transferred
http://lkml.org/lkml/2008/3/5/207
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/30850
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30116
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0233.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/30110
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.vupen.com/english/advisories/2008/2222/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://marc.info/?l=git-commits-head&m=120492000901739&w=2
mailing-list
x_refsource_MLIST
x_transferred
http://www.securityfocus.com/bid/29084
vdb-entry
x_refsource_BID
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/41340
vdb-entry
x_refsource_XF
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=437312
x_refsource_CONFIRM
x_transferred
http://lwn.net/Articles/272048/#Comments
x_refsource_MISC
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0211.html
vendor-advisory
x_refsource_REDHAT
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/30890
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2008-0508.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
mailing-list
x_refsource_MLIST
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31246
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/30818
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/30962
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lkml.org/lkml/2008/3/5/207
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/30850
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30116
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0233.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/30110
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2222/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://marc.info/?l=git-commits-head&m=120492000901739&w=2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.securityfocus.com/bid/29084
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/41340
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=437312
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lwn.net/Articles/272048/#Comments
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0211.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/30890
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0508.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000023.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31246
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/30818
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:17 Mar, 2008 | 23:44
Updated At:07 Nov, 2023 | 02:01

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

GNU
gnu
>>gcc>>4.3
cpe:2.3:a:gnu:gcc:4.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-399Primarynvd@nist.gov
CWE ID: CWE-399
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Subscription required to access Link 1014774
Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058cve@mitre.org
N/A
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.htmlcve@mitre.org
N/A
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.htmlcve@mitre.org
N/A
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.htmlcve@mitre.org
N/A
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.htmlcve@mitre.org
N/A
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51cve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.htmlcve@mitre.org
N/A
http://lists.vmware.com/pipermail/security-announce/2008/000023.htmlcve@mitre.org
N/A
http://lkml.org/lkml/2008/3/5/207cve@mitre.org
Exploit
http://lwn.net/Articles/272048/#Commentscve@mitre.org
N/A
http://marc.info/?l=git-commits-head&m=120492000901739&w=2cve@mitre.org
N/A
http://rhn.redhat.com/errata/RHSA-2008-0508.htmlcve@mitre.org
N/A
http://secunia.com/advisories/30110cve@mitre.org
N/A
http://secunia.com/advisories/30116cve@mitre.org
N/A
http://secunia.com/advisories/30818cve@mitre.org
N/A
http://secunia.com/advisories/30850cve@mitre.org
N/A
http://secunia.com/advisories/30890cve@mitre.org
N/A
http://secunia.com/advisories/30962cve@mitre.org
N/A
http://secunia.com/advisories/31246cve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2008-0211.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2008-0233.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/29084cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/2222/referencescve@mitre.org
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=437312cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/41340cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108cve@mitre.org
N/A
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000023.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lkml.org/lkml/2008/3/5/207
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://lwn.net/Articles/272048/#Comments
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=git-commits-head&m=120492000901739&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0508.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30110
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30116
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30818
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30850
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30890
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30962
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31246
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0211.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0233.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/29084
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2222/references
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=437312
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/41340
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

113Records found

CVE-2014-8504
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.30% / 86.72%
||
7 Day CHG~0.00%
Published-09 Dec, 2014 | 22:52
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.

Action-Not Available
Vendor-n/aFedora ProjectGNUCanonical Ltd.
Product-binutilsfedoraubuntu_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2014-8503
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.70% / 90.06%
||
7 Day CHG~0.00%
Published-09 Dec, 2014 | 22:52
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted ihex file.

Action-Not Available
Vendor-n/aFedora ProjectGNUCanonical Ltd.
Product-binutilsfedoraubuntu_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-20231
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.92% / 75.00%
||
7 Day CHG~0.00%
Published-12 Mar, 2021 | 18:23
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.

Action-Not Available
Vendor-n/aRed Hat, Inc.NetApp, Inc.GNUFedora Project
Product-e-series_performance_analyzerfedoraactive_iq_unified_managerenterprise_linuxgnutlsgnutls
CWE ID-CWE-416
Use After Free
CVE-2021-20232
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.84% / 73.85%
||
7 Day CHG~0.00%
Published-12 Mar, 2021 | 18:25
Updated-03 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.

Action-Not Available
Vendor-n/aRed Hat, Inc.GNUFedora Project
Product-fedoragnutlsenterprise_linuxgnutls
CWE ID-CWE-416
Use After Free
CVE-2020-9366
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.73% / 71.83%
||
7 Day CHG~0.00%
Published-24 Feb, 2020 | 16:20
Updated-04 Aug, 2024 | 10:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow was found in the way GNU Screen before 4.8.0 treated the special escape OSC 49. Specially crafted output, or a special program, could corrupt memory and crash Screen or possibly have unspecified other impact.

Action-Not Available
Vendor-n/aGNU
Product-screenn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2009-2828
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.31% / 84.14%
||
7 Day CHG~0.00%
Published-10 Nov, 2009 | 19:00
Updated-07 Aug, 2024 | 06:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The server in DirectoryService in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_x_servermac_os_xn/a
CWE ID-CWE-399
Not Available
CVE-2008-3052
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.58% / 68.09%
||
7 Day CHG~0.00%
Published-07 Jul, 2008 | 18:20
Updated-07 Aug, 2024 | 09:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the SQL Frontend (mh_omsqlio) extension 1.0.11 and earlier for TYPO3 allows remote attackers to cause a denial of service via unknown vectors.

Action-Not Available
Vendor-n/aTYPO3 Association
Product-sql_frontend_extensionn/a
CWE ID-CWE-399
Not Available
CVE-2008-2441
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.20% / 86.50%
||
7 Day CHG~0.00%
Published-04 Sep, 2008 | 16:00
Updated-07 Aug, 2024 | 08:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Secure ACS 3.x before 3.3(4) Build 12 patch 7, 4.0.x, 4.1.x before 4.1(4) Build 13 Patch 11, and 4.2.x before 4.2(0) Build 124 Patch 4 does not properly handle an EAP Response packet in which the value of the length field exceeds the actual packet length, which allows remote authenticated users to cause a denial of service (CSRadius and CSAuth service crash) or possibly execute arbitrary code via a crafted RADIUS (1) EAP-Response/Identity, (2) EAP-Response/MD5, or (3) EAP-Response/TLS Message Attribute packet.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-secure_acssecure_access_control_servern/a
CWE ID-CWE-399
Not Available
CVE-2008-2502
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.54% / 66.61%
||
7 Day CHG~0.00%
Published-29 May, 2008 | 23:00
Updated-07 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the web server in eMule X-Ray before 1.4 allows remote attackers to trigger memory corruption via unknown attack vectors.

Action-Not Available
Vendor-emulen/a
Product-x_rayn/a
CWE ID-CWE-399
Not Available
CVE-2006-6681
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.88% / 74.40%
||
7 Day CHG~0.00%
Published-21 Dec, 2006 | 19:00
Updated-07 Aug, 2024 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pedro Lineu Orso chetcpasswd 2.3.3 does not have a rate limit for client requests, which might allow remote attackers to determine passwords via a dictionary attack.

Action-Not Available
Vendor-chetcpasswdn/a
Product-chetcpasswdn/a
CWE ID-CWE-399
Not Available
CVE-2007-4661
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.58% / 84.98%
||
7 Day CHG~0.00%
Published-04 Sep, 2007 | 22:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The chunk_split function in string.c in PHP 5.2.3 does not properly calculate the needed buffer size due to precision loss when performing integer arithmetic with floating point numbers, which has unknown attack vectors and impact, possibly resulting in a heap-based buffer overflow. NOTE: this is due to an incomplete fix for CVE-2007-2872.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-399
Not Available
CVE-2007-4660
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.35% / 84.28%
||
7 Day CHG~0.00%
Published-04 Sep, 2007 | 22:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the chunk_split function in PHP before 5.2.4 has unknown impact and attack vectors, related to an incorrect size calculation.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-399
Not Available
CVE-2006-6304
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.11% / 77.31%
||
7 Day CHG~0.00%
Published-14 Dec, 2006 | 20:00
Updated-07 Aug, 2024 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The do_coredump function in fs/exec.c in the Linux kernel 2.6.19 sets the flag variable to O_EXCL but does not use it, which allows context-dependent attackers to modify arbitrary files via a rewrite attack during a core dump.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-399
Not Available
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found