Vulnerability Name:

CVE-2008-3908 (CCN-44848)

Assigned:2008-09-01
Published:2008-09-01
Updated:2018-10-11
Summary:Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow context-dependent attackers to execute arbitrary code via (1) a long argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or (4) WNDBVERSION environment variable; or (5) a user-supplied dictionary (aka data file).
Note: since WordNet itself does not run with special privileges, this issue only crosses privilege boundaries when WordNet is invoked as a third party component.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.6 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-3908

Source: SECUNIA
Type: UNKNOWN
32184

Source: SREASON
Type: UNKNOWN
4217

Source: CCN
Type: WordNet Web page
WordNet

Source: DEBIAN
Type: DSA-1634
wordnet -- stack and heap overflows

Source: CCN
Type: GLSA-200810-01
WordNet: Execution of arbitrary code

Source: GENTOO
Type: UNKNOWN
GLSA-200810-01

Source: CCN
Type: oCERT Advisories #2008-014
WordNet stack and heap overflows

Source: MISC
Type: UNKNOWN
http://www.ocert.org/advisories/ocert-2008-014.html

Source: CCN
Type: oCert Analysis, 2008-014
WordNet-3.0 Audit

Source: MISC
Type: UNKNOWN
http://www.ocert.org/analysis/2008-014/analysis.txt

Source: CCN
Type: oCert patch Web page
wordnet.patch

Source: MISC
Type: UNKNOWN
http://www.ocert.org/analysis/2008-014/wordnet.patch

Source: BUGTRAQ
Type: UNKNOWN
20080901 [oCERT-2008-014] WordNet stack and heap overflows

Source: BID
Type: Patch
30958

Source: CCN
Type: BID-30958
WordNet Multiple Buffer Overflow Vulnerabilities

Source: XF
Type: UNKNOWN
wordnet-morph-search-bo(44848)

Source: XF
Type: UNKNOWN
wordnet-morph-search-bo(44848)

Source: XF
Type: UNKNOWN
wordnet-morphinit-bo(44849)

Source: XF
Type: UNKNOWN
wordnet-wninit-bo(44850)

Source: XF
Type: UNKNOWN
wordnet-binsrch-search-bo(44851)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:princeton_university:wordnet:3.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:princeton_university:wordnet:3.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2008-3908 (CCN-44849)

    Assigned:2008-09-01
    Published:2008-09-01
    Updated:2008-09-01
    Summary:WordNet is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the morph_init() function. By sending an overly long request using the WNSEARCHDIR and WNHOMES environment variables, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.6 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2008-3908

    Source: CCN
    Type: WordNet Web page
    WordNet

    Source: DEBIAN
    Type: DSA-1634
    wordnet -- stack and heap overflows

    Source: CCN
    Type: GLSA-200810-01
    WordNet: Execution of arbitrary code

    Source: CCN
    Type: oCERT Advisories #2008-014
    WordNet stack and heap overflows

    Source: CCN
    Type: oCert Analysis, 2008-014
    WordNet-3.0 Audit

    Source: CCN
    Type: oCert patch Web page
    wordnet.patch

    Source: CCN
    Type: BID-30958
    WordNet Multiple Buffer Overflow Vulnerabilities

    Source: XF
    Type: UNKNOWN
    wordnet-morphinit-bo(44849)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:princeton_university:wordnet:3.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2008-3908 (CCN-44850)

    Assigned:2008-09-01
    Published:2008-09-01
    Updated:2008-09-01
    Summary:WordNet is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the wninit() function. By sending an overly long request using the WNDBVERSION environment variable, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.6 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2008-3908

    Source: CCN
    Type: WordNet Web page
    WordNet

    Source: DEBIAN
    Type: DSA-1634
    wordnet -- stack and heap overflows

    Source: CCN
    Type: GLSA-200810-01
    WordNet: Execution of arbitrary code

    Source: CCN
    Type: oCERT Advisories #2008-014
    WordNet stack and heap overflows

    Source: CCN
    Type: oCert Analysis, 2008-014
    WordNet-3.0 Audit

    Source: CCN
    Type: oCert patch Web page
    wordnet.patch

    Source: CCN
    Type: BID-30958
    WordNet Multiple Buffer Overflow Vulnerabilities

    Source: XF
    Type: UNKNOWN
    wordnet-wninit-bo(44850)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:princeton_university:wordnet:3.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2008-3908 (CCN-44851)

    Assigned:2008-09-01
    Published:2008-09-01
    Updated:2018-10-11
    Summary:Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow context-dependent attackers to execute arbitrary code via (1) a long argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or (4) WNDBVERSION environment variable; or (5) a user-supplied dictionary (aka data file).
    Note: since WordNet itself does not run with special privileges, this issue only crosses privilege boundaries when WordNet is invoked as a third party component.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.6 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Type:CWE-119
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2008-3908

    Source: CCN
    Type: WordNet Web page
    WordNet

    Source: DEBIAN
    Type: DSA-1634
    wordnet -- stack and heap overflows

    Source: CCN
    Type: GLSA-200810-01
    WordNet: Execution of arbitrary code

    Source: CCN
    Type: oCERT Advisories #2008-014
    WordNet stack and heap overflows

    Source: CCN
    Type: oCert Analysis, 2008-014
    WordNet-3.0 Audit

    Source: CCN
    Type: oCert patch Web page
    wordnet.patch

    Source: CCN
    Type: BID-30958
    WordNet Multiple Buffer Overflow Vulnerabilities

    Source: XF
    Type: UNKNOWN
    wordnet-binsrch-search-bo(44851)

    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:7971
    P
    DSA-1634 wordnet -- stack and heap overflows
    2015-02-23
    oval:org.mitre.oval:def:18628
    P
    DSA-1634-1 wordnet - arbitrary code execution
    2014-06-23
    oval:org.debian:def:1634
    V
    stack and heap overflows
    2008-09-01
    BACK
    princeton_university wordnet 3.0
    princeton_university wordnet 3.0
    gentoo linux *
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.1 x86_64
    mandrakesoft mandrake linux 2008.1
    princeton_university wordnet 3.0
    gentoo linux *
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.1 x86_64
    mandrakesoft mandrake linux 2008.1
    princeton_university wordnet 3.0
    gentoo linux *
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.1 x86_64
    mandrakesoft mandrake linux 2008.1