plib -- remote code execution via buffer overflow

ID BA51C2F7-5B43-11E1-8288-00262D5ED8EE
Type freebsd
Reporter FreeBSD
Modified 2011-12-21T00:00:00


Secunia reports:

A vulnerability has been discovered in PLIB, which can be exploited by malicious people to compromise an application using the library. The vulnerability is caused due to a boundary error within the "ulSetError()" function (src/util/ulError.cxx) when creating the error message, which can be exploited to overflow a static buffer. Successful exploitation allows the execution of arbitrary code but requires that the attacker can e.g. control the content of an overly long error message passed to the "ulSetError()" function. The vulnerability is confirmed in version 1.8.5. Other versions may also be affected.