OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, which leads to a stack-based buffer overflow.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch - Patch | |
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2003-November/013315.html - | |
References | () http://marc.info/?l=openbsd-security-announce&m=106808820119679&w=2 - | |
References | () http://marc.info/?l=openbsd-security-announce&m=106917441524978&w=2 - | |
References | () http://www.guninski.com/msuxobsd2.html - Exploit, Vendor Advisory | |
References | () http://www.openbsd.org/errata33.html - | |
References | () http://www.securityfocus.com/bid/8978 - |
Information
Published : 2003-12-15 05:00
Updated : 2024-11-20 23:45
NVD link : CVE-2003-0955
Mitre link : CVE-2003-0955
CVE.ORG link : CVE-2003-0955
JSON object : View
Products Affected
openbsd
- openbsd
CWE