Vulnerability Details : CVE-2004-0548
Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.
Vulnerability category: Execute code
Products affected by CVE-2004-0548
- cpe:2.3:a:gnu:aspell:0.50.5:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-0548
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0548
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2004-0548
-
http://www.securityfocus.com/bid/10497
-
http://marc.info/?l=bugtraq&m=108675120224531&w=2
'Aspell 'word-list-compress' stack overflow vulnerability' - MARC
-
http://www.gentoo.org/security/en/glsa/glsa-200406-14.xml
aspell: Buffer overflow in word-list-compress (GLSA 200406-14) — Gentoo securityVendor Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
Oracle Solaris Bulletin - January 2016
Jump to