Lucene search

K
freebsdFreeBSDA89B76A7-F6BD-11DD-94D9-0030843D3802
HistoryNov 25, 2008 - 12:00 a.m.

amaya -- multiple buffer overflow vulnerabilities

2008-11-2500:00:00
vuxml.freebsd.org
11

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.945 High

EPSS

Percentile

99.3%

Secunia reports:

A boundary error when processing “div” HTML tags can be exploited
to cause a stack-based buffer overflow via an overly long “id”
parameter.
A boundary error exists when processing overly long links. This can
be exploited to cause a stack-based buffer overflow by tricking the
user into e.g. editing a malicious link.
A boundary error when processing e.g. a “bdo” HTML tag having an
overly long “dir” attribute can be exploited to cause a stack-based
buffer overflow.
A boundary error when processing “input” HTML tags can be
exploited to cause a stack-based buffer overflow via an overly long
e.g. “type” attribute.

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.945 High

EPSS

Percentile

99.3%