CVE-2010-2891

Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/41841 Vendor Advisory
http://secunia.com/advisories/42877
http://secunia.com/advisories/42902
http://secunia.com/advisories/43068
http://security-tracker.debian.org/tracker/CVE-2010-2891
http://www.coresecurity.com/content/libsmi-smigetnode-buffer-overflow Exploit Patch
http://www.debian.org/security/2011/dsa-2145
http://www.exploit-db.com/exploits/15293 Exploit Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2010:209
http://www.securityfocus.com/archive/1/514382/100/0/threaded
http://www.securityfocus.com/bid/44276 Exploit Patch
http://www.vupen.com/english/advisories/2010/2764 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0076
http://www.vupen.com/english/advisories/2011/0111
http://www.vupen.com/english/advisories/2011/0212
https://exchange.xforce.ibmcloud.com/vulnerabilities/62686
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/41841 Vendor Advisory
http://secunia.com/advisories/42877
http://secunia.com/advisories/42902
http://secunia.com/advisories/43068
http://security-tracker.debian.org/tracker/CVE-2010-2891
http://www.coresecurity.com/content/libsmi-smigetnode-buffer-overflow Exploit Patch
http://www.debian.org/security/2011/dsa-2145
http://www.exploit-db.com/exploits/15293 Exploit Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2010:209
http://www.securityfocus.com/archive/1/514382/100/0/threaded
http://www.securityfocus.com/bid/44276 Exploit Patch
http://www.vupen.com/english/advisories/2010/2764 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0076
http://www.vupen.com/english/advisories/2011/0111
http://www.vupen.com/english/advisories/2011/0212
https://exchange.xforce.ibmcloud.com/vulnerabilities/62686
Configurations

Configuration 1 (hide)

cpe:2.3:a:tu-braunschweig:libsmi:0.4.8:*:*:*:*:*:*:*

History

21 Nov 2024, 01:17

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html -
References () http://secunia.com/advisories/41841 - Vendor Advisory () http://secunia.com/advisories/41841 - Vendor Advisory
References () http://secunia.com/advisories/42877 - () http://secunia.com/advisories/42877 -
References () http://secunia.com/advisories/42902 - () http://secunia.com/advisories/42902 -
References () http://secunia.com/advisories/43068 - () http://secunia.com/advisories/43068 -
References () http://security-tracker.debian.org/tracker/CVE-2010-2891 - () http://security-tracker.debian.org/tracker/CVE-2010-2891 -
References () http://www.coresecurity.com/content/libsmi-smigetnode-buffer-overflow - Exploit, Patch () http://www.coresecurity.com/content/libsmi-smigetnode-buffer-overflow - Exploit, Patch
References () http://www.debian.org/security/2011/dsa-2145 - () http://www.debian.org/security/2011/dsa-2145 -
References () http://www.exploit-db.com/exploits/15293 - Exploit, Patch () http://www.exploit-db.com/exploits/15293 - Exploit, Patch
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:209 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:209 -
References () http://www.securityfocus.com/archive/1/514382/100/0/threaded - () http://www.securityfocus.com/archive/1/514382/100/0/threaded -
References () http://www.securityfocus.com/bid/44276 - Exploit, Patch () http://www.securityfocus.com/bid/44276 - Exploit, Patch
References () http://www.vupen.com/english/advisories/2010/2764 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2764 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0076 - () http://www.vupen.com/english/advisories/2011/0076 -
References () http://www.vupen.com/english/advisories/2011/0111 - () http://www.vupen.com/english/advisories/2011/0111 -
References () http://www.vupen.com/english/advisories/2011/0212 - () http://www.vupen.com/english/advisories/2011/0212 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/62686 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/62686 -

Information

Published : 2010-10-28 00:00

Updated : 2024-11-21 01:17


NVD link : CVE-2010-2891

Mitre link : CVE-2010-2891

CVE.ORG link : CVE-2010-2891


JSON object : View

Products Affected

tu-braunschweig

  • libsmi
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer