ID CVE-2004-0548
Summary Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:aspell:0.50.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:aspell:0.50.5:*:*:*:*:*:*:*
  • cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
    cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 28-11-2016 - 19:06)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 10497
bugtraq 20040608 Aspell 'word-list-compress' stack overflow vulnerability
confirm http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
gentoo GLSA-200406-14
Last major update 28-11-2016 - 19:06
Published 06-08-2004 - 04:00
Last modified 28-11-2016 - 19:06
Back to Top