ID CVE-2005-3964
Summary Multiple buffer overflows in libUil (libUil.so) in OpenMotif 2.2.3, and possibly other versions, allows attackers to execute arbitrary code via the (1) diag_issue_diagnostic function in UilDiags.c and (2) open_source_file function in UilSrcSrc.c.
References
Vulnerable Configurations
  • cpe:2.3:a:integrated_computer_solutions:openmotif:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:integrated_computer_solutions:openmotif:2.2.3:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 19-10-2018 - 15:39)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
accepted 2013-04-29T04:19:08.417-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description Multiple buffer overflows in libUil (libUil.so) in OpenMotif 2.2.3, and possibly other versions, allows attackers to execute arbitrary code via the (1) diag_issue_diagnostic function in UilDiags.c and (2) open_source_file function in UilSrcSrc.c.
family unix
id oval:org.mitre.oval:def:9393
status accepted
submitted 2010-07-09T03:56:16-04:00
title Multiple buffer overflows in libUil (libUil.so) in OpenMotif 2.2.3, and possibly other versions, allows attackers to execute arbitrary code via the (1) diag_issue_diagnostic function in UilDiags.c and (2) open_source_file function in UilSrcSrc.c.
version 28
redhat via4
advisories
  • bugzilla
    id 430519
    title CVE-2005-3964 openmotif libUil buffer overflows
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • comment openmotif21 is earlier than 0:2.1.30-11.RHEL4.5
            oval oval:com.redhat.rhsa:tst:20060272001
          • comment openmotif21 is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060272002
        • AND
          • comment openmotif is earlier than 0:2.2.3-10.RHEL4.1
            oval oval:com.redhat.rhsa:tst:20060272003
          • comment openmotif is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060272004
        • AND
          • comment openmotif-devel is earlier than 0:2.2.3-10.RHEL4.1
            oval oval:com.redhat.rhsa:tst:20060272005
          • comment openmotif-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060272006
    rhsa
    id RHSA-2006:0272
    released 2006-04-04
    severity Moderate
    title RHSA-2006:0272: openmotif security update (Moderate)
  • rhsa
    id RHSA-2008:0261
rpms
  • openmotif-0:2.2.3-10.RHEL4.1
  • openmotif-0:2.2.3-5.RHEL3.3
  • openmotif-debuginfo-0:2.2.3-10.RHEL4.1
  • openmotif-debuginfo-0:2.2.3-5.RHEL3.3
  • openmotif-devel-0:2.2.3-10.RHEL4.1
  • openmotif-devel-0:2.2.3-5.RHEL3.3
  • openmotif21-0:2.1.30-11.RHEL4.5
  • openmotif21-0:2.1.30-9.RHEL3.7
  • openmotif21-debuginfo-0:2.1.30-11.RHEL4.5
  • openmotif21-debuginfo-0:2.1.30-9.RHEL3.7
  • jabberd-0:2.0s10-3.38.rhn
  • java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4
  • java-1.4.2-ibm-devel-0:1.4.2.10-1jpp.2.el4
  • jfreechart-0:0.9.20-3.rhn
  • openmotif21-0:2.1.30-11.RHEL4.6
  • openmotif21-debuginfo-0:2.1.30-11.RHEL4.6
  • perl-Crypt-CBC-0:2.24-1.el4
  • rhn-apache-0:1.3.27-36.rhn.rhel4
  • rhn-modjk-ap13-0:1.2.23-2rhn.rhel4
  • rhn-modperl-0:1.29-16.rhel4
  • rhn-modssl-0:2.8.12-8.rhn.10.rhel4
  • tomcat5-0:5.0.30-0jpp_10rh
  • jabberd-0:2.0s10-3.37.rhn
  • jabberd-0:2.0s10-3.38.rhn
  • java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3
  • java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4
  • java-1.4.2-ibm-devel-0:1.4.2.10-1jpp.2.el3
  • java-1.4.2-ibm-devel-0:1.4.2.10-1jpp.2.el4
  • jfreechart-0:0.9.20-3.rhn
  • openmotif21-0:2.1.30-11.RHEL4.6
  • openmotif21-0:2.1.30-9.RHEL3.8
  • openmotif21-debuginfo-0:2.1.30-11.RHEL4.6
  • openmotif21-debuginfo-0:2.1.30-9.RHEL3.8
  • perl-Crypt-CBC-0:2.24-1.el3
  • perl-Crypt-CBC-0:2.24-1.el4
  • rhn-apache-0:1.3.27-36.rhn.rhel3
  • rhn-apache-0:1.3.27-36.rhn.rhel4
  • rhn-modjk-ap13-0:1.2.23-2rhn.rhel3
  • rhn-modjk-ap13-0:1.2.23-2rhn.rhel4
  • rhn-modperl-0:1.29-16.rhel3
  • rhn-modperl-0:1.29-16.rhel4
  • rhn-modssl-0:2.8.12-8.rhn.10.rhel3
  • rhn-modssl-0:2.8.12-8.rhn.10.rhel4
  • tomcat5-0:5.0.30-0jpp_10rh
refmap via4
bid
  • 15684
  • 15686
bugtraq 20051202 [xfocus-SD-051202]openMotif libUil Multiple vulnerability
fulldisc 20051201 [xfocus-SD-051202]openMotif-libUil-Multiple_vulnerability
sectrack 1015303
vupen ADV-2005-2709
xf
  • openmotif-diagissuediagnostic-bo(23388)
  • openmotif-opensourcefile-bo(23389)
statements via4
contributor Mark J Cox
lastmodified 2007-03-14
organization Red Hat
statement Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
Last major update 19-10-2018 - 15:39
Published 02-12-2005 - 11:03
Last modified 19-10-2018 - 15:39
Back to Top