CVE-2016-1243

Stack-based buffer overflow in the extractTree function in unADF allows remote attackers to execute arbitrary code via a long pathname.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:unadf_project:unadf:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://tmp.tjjr.fi/0001-Fix-unsafe-extraction-by-using-mkdir-instead-of-shel.patch - Patch, Vendor Advisory () http://tmp.tjjr.fi/0001-Fix-unsafe-extraction-by-using-mkdir-instead-of-shel.patch - Patch, Vendor Advisory
References () http://www.debian.org/security/2016/dsa-3676 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3676 - Third Party Advisory
References () http://www.securityfocus.com/bid/93329 - () http://www.securityfocus.com/bid/93329 -
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838248 - Patch, Third Party Advisory, VDB Entry () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838248 - Patch, Third Party Advisory, VDB Entry
References () https://lists.debian.org/debian-lts-announce/2024/03/msg00015.html - () https://lists.debian.org/debian-lts-announce/2024/03/msg00015.html -
References () https://security.gentoo.org/glsa/201804-20 - () https://security.gentoo.org/glsa/201804-20 -

15 Mar 2024, 19:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/03/msg00015.html -

Information

Published : 2016-10-03 18:59

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1243

Mitre link : CVE-2016-1243

CVE.ORG link : CVE-2016-1243


JSON object : View

Products Affected

debian

  • debian_linux

unadf_project

  • unadf
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer