ID CVE-2008-3196
Summary skeleton.c in yacc does not properly handle reduction of a rule with an empty right hand side, which allows context-dependent attackers to cause an out-of-bounds stack access when the yacc stack pointer points to the end of the stack.
References
Vulnerable Configurations
  • cpe:2.3:a:yacc:yacc:*:*:*:*:*:*:*:*
    cpe:2.3:a:yacc:yacc:*:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 27-11-2012 - 03:48)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:C
refmap via4
mlist
  • [openbsd-cvs] 20080708 CVS: cvs.openbsd.org: src
  • [openbsd-cvs] 20080708 Re: CVS: cvs.openbsd.org: src
secunia 31073
vupen ADV-2008-2151
statements via4
contributor Mark J Cox
lastmodified 2008-07-17
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-3196 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.
Last major update 27-11-2012 - 03:48
Published 16-07-2008 - 18:41
Last modified 27-11-2012 - 03:48
Back to Top