GnuCOBOL 2.2 stack-based buffer overflow in cb_name() function via crafted COBOL source cod
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
Cvelist | CVE-2019-16395 | 17 Sep 201921:06 | – | cvelist |
NVD | CVE-2019-16395 | 17 Sep 201922:15 | – | nvd |
Prion | Stack overflow | 17 Sep 201922:15 | – | prion |
Debian CVE | CVE-2019-16395 | 17 Sep 201922:15 | – | debiancve |
CVE | CVE-2019-16395 | 17 Sep 201922:15 | – | cve |
Source | Link |
---|---|
sourceforge | www.sourceforge.net/p/open-cobol/bugs/586/ |
cve | www.cve.org/CVERecord |
nvd | www.nvd.nist.gov/vuln/detail/CVE-2019-16395 |
launchpad | www.launchpad.net/bugs/cve/CVE-2019-16395 |
security-tracker | www.security-tracker.debian.org/tracker/CVE-2019-16395 |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | gnucobol | any | UNKNOWN |
ubuntu | 18.04 | noarch | open-cobol | any | UNKNOWN |
ubuntu | 16.04 | noarch | open-cobol | any | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo