Vulnerability Name: | CVE-2009-0148 (CCN-50302) |
Assigned: | 2009-04-30 |
Published: | 2009-04-30 |
Updated: | 2017-09-29 |
Summary: | Multiple buffer overflows in Cscope before 15.7a allow remote attackers to execute arbitrary code via long strings in input such as (1) source-code tokens and (2) pathnames, related to integer overflows in some cases. Note: this issue exists because of an incomplete fix for CVE-2004-2541. |
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 5.1 Medium (REDHAT CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P) 3.8 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-119
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2009-0148
Source: APPLE Type: UNKNOWN APPLE-SA-2009-05-12
Source: CCN Type: RHSA-2009-1101 Moderate: cscope security update
Source: CCN Type: RHSA-2009-1102 Moderate: cscope security update
Source: CCN Type: SA34978 Cscope Multiple Buffer Overflow Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 34978
Source: CCN Type: SA35074 Apple Mac OS X Security Update Fixes Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 35074
Source: SECUNIA Type: Vendor Advisory 35213
Source: SECUNIA Type: Vendor Advisory 35214
Source: SECUNIA Type: Vendor Advisory 35462
Source: GENTOO Type: UNKNOWN GLSA-200905-02
Source: CCN Type: SECTRACK ID: 1022218 Mac OS X CFF Font and Cscope Source File Bugs Let Remote Users Execute Arbitrary Code
Source: CONFIRM Type: Patch http://sourceforge.net/forum/forum.php?forum_id=947983
Source: MLIST Type: UNKNOWN [cscope-cvs] 20090410 CVS: cscope/src snprintf.c, NONE, 1.1 build.c, 1.14, 1.15 command.c, 1.32, 1.33 dir.c, 1.30, 1.31 display.c, 1.29, 1.30 edit.c, 1.6, 1.7 exec.c, 1.11, 1.12 find.c, 1.20, 1.21 global.h, 1.36, 1.37 main.c, 1.45, 1.46 Makefile.am, 1.12, 1.13 Makefile.in, 1.15, 1.16 vpaccess.c, 1.2, 1.3 vpfopen.c, 1.3, 1.4 vpopen.c, 1.4, 1.5
Source: CCN Type: SourceForge.net: Files cscope, File Release Notes and Changelog, Release Name: 15.7a
Source: CONFIRM Type: Patch http://sourceforge.net/project/shownotes.php?group_id=4664&release_id=679527
Source: CCN Type: Apple Web site About the security content of Security Update 2009-002 / Mac OS X v10.5.7
Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT3549
Source: CCN Type: ASA-2009-235 cscope security update (RHSA-2009-1102)
Source: CCN Type: ASA-2009-236 cscope security update (RHSA-2009-1101)
Source: DEBIAN Type: UNKNOWN DSA-1806
Source: DEBIAN Type: DSA-1806 cscope -- buffer overflows
Source: CCN Type: GLSA-200905-02 Cscope: User-assisted execution of arbitrary code
Source: MLIST Type: UNKNOWN [oss-security] 20090506 Re: Old cscope buffer overflow
Source: REDHAT Type: UNKNOWN RHSA-2009:1101
Source: REDHAT Type: UNKNOWN RHSA-2009:1102
Source: BID Type: UNKNOWN 34805
Source: CCN Type: BID-34805 Cscope Multiple Stack Based Buffer Overflow Vulnerabilities
Source: SECTRACK Type: UNKNOWN 1022218
Source: CERT Type: US Government Resource TA09-133A
Source: VUPEN Type: Vendor Advisory ADV-2009-1238
Source: VUPEN Type: Vendor Advisory ADV-2009-1297
Source: CCN Type: Red Hat Bugzilla Bug 490667 CVE-2009-0148 cscope: multiple buffer overflows
Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=490667
Source: XF Type: UNKNOWN cscope-files-bo(50302)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9633
|
Vulnerable Configuration: | Configuration 1: cpe:/a:cscope:cscope:13.0:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.0bl2:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.1:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.3:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.4:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.5:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.6:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.7:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6: cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7: cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 8: cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1: cpe:/a:cscope:cscope:15.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.7:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.6:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.4:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.3:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:15.1:*:*:*:*:*:*:*OR cpe:/a:cscope:cscope:13.0:*:*:*:*:*:*:*AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
cscope cscope 13.0
cscope cscope 15.0bl2
cscope cscope 15.1
cscope cscope 15.3
cscope cscope 15.4
cscope cscope 15.5
cscope cscope 15.6
cscope cscope 15.7
cscope cscope 15.5
apple mac os x 10.5
apple mac os x server 10.5
apple mac os x 10.4.11
apple mac os x 10.5.1
apple mac os x server 10.4.11
apple mac os x server 10.5.1
apple mac os x 10.5.2
apple mac os x server 10.5.2
apple mac os x server 10.5.3
apple mac os x 10.5.3
apple mac os x 10.5.4
apple mac os x server 10.5.4
apple mac os x 10.5.5
apple mac os x server 10.5.5
apple mac os x 10.5.6
apple mac os x server 10.5.6
cscope cscope 15.7
cscope cscope 15.6
cscope cscope 15.4
cscope cscope 15.3
cscope cscope 15.1
cscope cscope 13.0
gentoo linux *
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 5
redhat enterprise linux 5
debian debian linux 5.0