Vulnerability Name: | CVE-2005-2930 (CCN-40631) | ||||||||
Assigned: | 2005-10-28 | ||||||||
Published: | 2005-10-28 | ||||||||
Updated: | 2011-08-02 | ||||||||
Summary: | Stack-based buffer overflow in the _chm_find_in_PMGL function in chm_lib.c for chmlib before 0.36, as used in products such as KchmViewer, allows user-assisted attackers to execute arbitrary code via a CHM file containing a long element, a different vulnerability than CVE-2005-3318. | ||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P) 3.8 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2005-2930 Source: CCN Type: CHM lib Web site CHM lib Source: CCN Type: SA17775 KchmViewer chmlib Buffer Overflow Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 17775 Source: SREASON Type: UNKNOWN 125 Source: CCN Type: SECTRACK ID: 1015120 chmlib Buffer Overflow in *_chm_find_in_PMGL() Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: Patch, Vendor Advisory 1015120 Source: CCN Type: SourceForge.net KchmViewer Source: IDEFENSE Type: Patch, Vendor Advisory 20051028 Multiple Vendor chmlib CHM File Handling Buffer Overflow Vulnerability Source: BID Type: Patch 15234 Source: CCN Type: BID-15234 Jed Wing CHM Lib _chm_find_in_PMGL Stack Buffer Overflow Vulnerability Source: VUPEN Type: Vendor Advisory ADV-2005-2249 Source: XF Type: UNKNOWN chmlib-chmfindinpmgl-bo(40631) Source: CCN Type: iDefense Labs PUBLIC ADVISORY: 10.28.05 Multiple Vendor chmlib CHM File Handling Buffer Overflow Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |