oss-sec mailing list archives

Re: [oCERT-2008-014] WordNet stack and heap overflows


From: "Steven M. Christey" <coley () linus mitre org>
Date: Thu, 4 Sep 2008 12:24:22 -0400 (EDT)


Notice how CVE treats these as all the same core type of issue, even
though the types of attack vectors are different (command line vs. env
variable) and the types of buffers are different (heap vs. stack).  The
basic programming error was the same regardless of where it occurred or
what it affected.

- Steve

======================================================
Name: CVE-2008-3908
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3908
Reference: BUGTRAQ:20080901 [oCERT-2008-014] WordNet stack and heap overflows
Reference: URL:http://www.securityfocus.com/archive/1/archive/1/495883/100/0/threaded
Reference: MISC:http://http://www.ocert.org/analysis/2008-014/analysis.txt
Reference: MISC:http://www.ocert.org/advisories/ocert-2008-014.html
Reference: MISC:http://www.ocert.org/analysis/2008-014/wordnet.patch
Reference: BID:30958
Reference: URL:http://www.securityfocus.com/bid/30958
Reference: XF:wordnet-binsrch-search-bo(44851)
Reference: URL:http://xforce.iss.net/xforce/xfdb/44851
Reference: XF:wordnet-morph-search-bo(44848)
Reference: URL:http://xforce.iss.net/xforce/xfdb/44848
Reference: XF:wordnet-morphinit-bo(44849)
Reference: URL:http://xforce.iss.net/xforce/xfdb/44849
Reference: XF:wordnet-wninit-bo(44850)
Reference: URL:http://xforce.iss.net/xforce/xfdb/44850

Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow
context-dependent attackers to execute arbitrary code via (1) a long
argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or
(4) WNDBVERSION environment variable; or (5) a user-supplied
dictionary (aka data file).  NOTE: since WordNet itself does not run
with special privileges, this issue only crosses privilege boundaries
in cases such as when WordNet is invoked as a third party component.



Current thread: