An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100828 | Broken Link Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201908-26 | Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317 | Exploit Technical Description Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-09-13 18:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-2816
Mitre link : CVE-2017-2816
CVE.ORG link : CVE-2017-2816
JSON object : View
Products Affected
debian
- debian_linux
libofx_project
- libofx
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer