Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD; and (e) SearchIndexer.exe on Vista Enterprise.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/achievement_securityalert/60 - | |
References | () http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c - Vendor Advisory | |
References | () http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c.diff?r1=1.41%3Br2=1.42%3Bf=h - | |
References | () http://www.securityfocus.com/archive/1/501505/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/34008 - Exploit | |
References | () http://www.securitytracker.com/id?1021818 - | |
References | () https://www.exploit-db.com/exploits/8163 - |
Information
Published : 2009-03-09 21:30
Updated : 2024-11-21 01:00
NVD link : CVE-2009-0537
Mitre link : CVE-2009-0537
CVE.ORG link : CVE-2009-0537
JSON object : View
Products Affected
microsoft
- interix
openbsd
- openbsd
CWE
CWE-189
Numeric Errors