Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a string that is inconsistent with the expected number of fields.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx%3Ba=commit%3Bh=904a46f90dd3f046bfac0b64a5e813d7cd4fca59 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:165 - | |
References | () http://www.openwall.com/lists/oss-security/2010/08/20/12 - | |
References | () http://www.openwall.com/lists/oss-security/2010/08/20/5 - | |
References | () http://www.securityfocus.com/bid/42592 - | |
References | () http://www.vupen.com/english/advisories/2010/2232 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=625866 - |
Information
Published : 2010-08-24 20:00
Updated : 2025-04-11 00:51
NVD link : CVE-2010-2947
Mitre link : CVE-2010-2947
CVE.ORG link : CVE-2010-2947
JSON object : View
Products Affected
jan_engelhardt
- libhx
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer