CVE-2012-4552

Stack-based buffer overflow in the error function in ssg/ssgParser.cxx in PLIB 1.8.5 allows remote attackers to execute arbitrary code via a crafted 3d model file that triggers a long error message, as demonstrated by a .ase file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:steve_j_baker:plib:1.8.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:43

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091932.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091932.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091937.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091937.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091964.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091964.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00013.html - () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00013.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00015.html - () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00015.html -
References () http://secunia.com/advisories/51340 - () http://secunia.com/advisories/51340 -
References () http://www.openwall.com/lists/oss-security/2012/10/29/9 - () http://www.openwall.com/lists/oss-security/2012/10/29/9 -
References () http://www.osvdb.org/87001 - () http://www.osvdb.org/87001 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=871187 - () https://bugzilla.redhat.com/show_bug.cgi?id=871187 -

Information

Published : 2012-11-18 23:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-4552

Mitre link : CVE-2012-4552

CVE.ORG link : CVE-2012-4552


JSON object : View

Products Affected

steve_j_baker

  • plib
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer