CVE-2006-4262

Multiple buffer overflows in cscope 15.5 and earlier allow user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple vectors including (1) a long pathname that is not properly handled during file list parsing, (2) long pathnames that result from path variable expansion such as tilde expansion for the HOME environment variable, and (3) a long -f (aka reffile) command line argument.
References
Link Resource
http://secunia.com/advisories/21601 Vendor Advisory
http://secunia.com/advisories/22239 Vendor Advisory
http://secunia.com/advisories/22515 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200610-08.xml
http://sourceforge.net/mailarchive/forum.php?thread_id=30266760&forum_id=33500
http://sourceforge.net/mailarchive/forum.php?thread_id=30266761&forum_id=33500
http://www.debian.org/security/2006/dsa-1186
http://www.osvdb.org/28135
http://www.osvdb.org/28136
http://www.redhat.com/support/errata/RHSA-2009-1101.html Vendor Advisory
http://www.securityfocus.com/bid/19686
http://www.securityfocus.com/bid/19687
http://www.vupen.com/english/advisories/2006/3374 Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203645 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/28545
https://exchange.xforce.ibmcloud.com/vulnerabilities/28546
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9661
http://secunia.com/advisories/21601 Vendor Advisory
http://secunia.com/advisories/22239 Vendor Advisory
http://secunia.com/advisories/22515 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200610-08.xml
http://sourceforge.net/mailarchive/forum.php?thread_id=30266760&forum_id=33500
http://sourceforge.net/mailarchive/forum.php?thread_id=30266761&forum_id=33500
http://www.debian.org/security/2006/dsa-1186
http://www.osvdb.org/28135
http://www.osvdb.org/28136
http://www.redhat.com/support/errata/RHSA-2009-1101.html Vendor Advisory
http://www.securityfocus.com/bid/19686
http://www.securityfocus.com/bid/19687
http://www.vupen.com/english/advisories/2006/3374 Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203645 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/28545
https://exchange.xforce.ibmcloud.com/vulnerabilities/28546
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9661
Configurations

Configuration 1 (hide)

cpe:2.3:a:cscope:cscope:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://secunia.com/advisories/21601 - Vendor Advisory () http://secunia.com/advisories/21601 - Vendor Advisory
References () http://secunia.com/advisories/22239 - Vendor Advisory () http://secunia.com/advisories/22239 - Vendor Advisory
References () http://secunia.com/advisories/22515 - Vendor Advisory () http://secunia.com/advisories/22515 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200610-08.xml - () http://security.gentoo.org/glsa/glsa-200610-08.xml -
References () http://sourceforge.net/mailarchive/forum.php?thread_id=30266760&forum_id=33500 - () http://sourceforge.net/mailarchive/forum.php?thread_id=30266760&forum_id=33500 -
References () http://sourceforge.net/mailarchive/forum.php?thread_id=30266761&forum_id=33500 - () http://sourceforge.net/mailarchive/forum.php?thread_id=30266761&forum_id=33500 -
References () http://www.debian.org/security/2006/dsa-1186 - () http://www.debian.org/security/2006/dsa-1186 -
References () http://www.osvdb.org/28135 - () http://www.osvdb.org/28135 -
References () http://www.osvdb.org/28136 - () http://www.osvdb.org/28136 -
References () http://www.redhat.com/support/errata/RHSA-2009-1101.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2009-1101.html - Vendor Advisory
References () http://www.securityfocus.com/bid/19686 - () http://www.securityfocus.com/bid/19686 -
References () http://www.securityfocus.com/bid/19687 - () http://www.securityfocus.com/bid/19687 -
References () http://www.vupen.com/english/advisories/2006/3374 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3374 - Vendor Advisory
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203645 - Patch, Vendor Advisory () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203645 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28545 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28545 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28546 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28546 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9661 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9661 -

Information

Published : 2006-08-23 10:04

Updated : 2025-04-03 01:03


NVD link : CVE-2006-4262

Mitre link : CVE-2006-4262

CVE.ORG link : CVE-2006-4262


JSON object : View

Products Affected

cscope

  • cscope
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer