Vulnerability Name: | CVE-2008-3908 (CCN-44848) | ||||||||||||||||
Assigned: | 2008-09-01 | ||||||||||||||||
Published: | 2008-09-01 | ||||||||||||||||
Updated: | 2018-10-11 | ||||||||||||||||
Summary: | Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow context-dependent attackers to execute arbitrary code via (1) a long argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or (4) WNDBVERSION environment variable; or (5) a user-supplied dictionary (aka data file). Note: since WordNet itself does not run with special privileges, this issue only crosses privilege boundaries when WordNet is invoked as a third party component. | ||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.6 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
5.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2008-3908 Source: SECUNIA Type: UNKNOWN 32184 Source: SREASON Type: UNKNOWN 4217 Source: CCN Type: WordNet Web page WordNet Source: DEBIAN Type: DSA-1634 wordnet -- stack and heap overflows Source: CCN Type: GLSA-200810-01 WordNet: Execution of arbitrary code Source: GENTOO Type: UNKNOWN GLSA-200810-01 Source: CCN Type: oCERT Advisories #2008-014 WordNet stack and heap overflows Source: MISC Type: UNKNOWN http://www.ocert.org/advisories/ocert-2008-014.html Source: CCN Type: oCert Analysis, 2008-014 WordNet-3.0 Audit Source: MISC Type: UNKNOWN http://www.ocert.org/analysis/2008-014/analysis.txt Source: CCN Type: oCert patch Web page wordnet.patch Source: MISC Type: UNKNOWN http://www.ocert.org/analysis/2008-014/wordnet.patch Source: BUGTRAQ Type: UNKNOWN 20080901 [oCERT-2008-014] WordNet stack and heap overflows Source: BID Type: Patch 30958 Source: CCN Type: BID-30958 WordNet Multiple Buffer Overflow Vulnerabilities Source: XF Type: UNKNOWN wordnet-morph-search-bo(44848) Source: XF Type: UNKNOWN wordnet-morph-search-bo(44848) Source: XF Type: UNKNOWN wordnet-morphinit-bo(44849) Source: XF Type: UNKNOWN wordnet-wninit-bo(44850) Source: XF Type: UNKNOWN wordnet-binsrch-search-bo(44851) | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Vulnerability Name: | CVE-2008-3908 (CCN-44849) | ||||||||||||||||
Assigned: | 2008-09-01 | ||||||||||||||||
Published: | 2008-09-01 | ||||||||||||||||
Updated: | 2008-09-01 | ||||||||||||||||
Summary: | WordNet is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the morph_init() function. By sending an overly long request using the WNSEARCHDIR and WNHOMES environment variables, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. | ||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.6 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
5.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
| ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2008-3908 Source: CCN Type: WordNet Web page WordNet Source: DEBIAN Type: DSA-1634 wordnet -- stack and heap overflows Source: CCN Type: GLSA-200810-01 WordNet: Execution of arbitrary code Source: CCN Type: oCERT Advisories #2008-014 WordNet stack and heap overflows Source: CCN Type: oCert Analysis, 2008-014 WordNet-3.0 Audit Source: CCN Type: oCert patch Web page wordnet.patch Source: CCN Type: BID-30958 WordNet Multiple Buffer Overflow Vulnerabilities Source: XF Type: UNKNOWN wordnet-morphinit-bo(44849) | ||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Vulnerability Name: | CVE-2008-3908 (CCN-44850) | ||||||||||||||||
Assigned: | 2008-09-01 | ||||||||||||||||
Published: | 2008-09-01 | ||||||||||||||||
Updated: | 2008-09-01 | ||||||||||||||||
Summary: | WordNet is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the wninit() function. By sending an overly long request using the WNDBVERSION environment variable, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. | ||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.6 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
5.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
| ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2008-3908 Source: CCN Type: WordNet Web page WordNet Source: DEBIAN Type: DSA-1634 wordnet -- stack and heap overflows Source: CCN Type: GLSA-200810-01 WordNet: Execution of arbitrary code Source: CCN Type: oCERT Advisories #2008-014 WordNet stack and heap overflows Source: CCN Type: oCert Analysis, 2008-014 WordNet-3.0 Audit Source: CCN Type: oCert patch Web page wordnet.patch Source: CCN Type: BID-30958 WordNet Multiple Buffer Overflow Vulnerabilities Source: XF Type: UNKNOWN wordnet-wninit-bo(44850) | ||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Vulnerability Name: | CVE-2008-3908 (CCN-44851) | ||||||||||||||||
Assigned: | 2008-09-01 | ||||||||||||||||
Published: | 2008-09-01 | ||||||||||||||||
Updated: | 2018-10-11 | ||||||||||||||||
Summary: | Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow context-dependent attackers to execute arbitrary code via (1) a long argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or (4) WNDBVERSION environment variable; or (5) a user-supplied dictionary (aka data file). Note: since WordNet itself does not run with special privileges, this issue only crosses privilege boundaries when WordNet is invoked as a third party component. | ||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.6 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
5.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2008-3908 Source: CCN Type: WordNet Web page WordNet Source: DEBIAN Type: DSA-1634 wordnet -- stack and heap overflows Source: CCN Type: GLSA-200810-01 WordNet: Execution of arbitrary code Source: CCN Type: oCERT Advisories #2008-014 WordNet stack and heap overflows Source: CCN Type: oCert Analysis, 2008-014 WordNet-3.0 Audit Source: CCN Type: oCert patch Web page wordnet.patch Source: CCN Type: BID-30958 WordNet Multiple Buffer Overflow Vulnerabilities Source: XF Type: UNKNOWN wordnet-binsrch-search-bo(44851) | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |