Vulnerability Details : CVE-2007-3962
Multiple stack-based buffer overflows in fsplib.c in fsplib before 0.9 might allow remote attackers to execute arbitrary code via (1) a long filename that is not properly handled by the fsp_readdir_native function when MAXNAMLEN is greater than 255, or (2) a long d_name directory (dirent) field in the fsp_readdir function.
Vulnerability category: Execute code
Products affected by CVE-2007-3962
- cpe:2.3:a:fsp:c_library:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-3962
8.42%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3962
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2007-3962
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-3962
-
Red Hat 2007-08-10Not vulnerable. fsplib is part of gftp in Red Hat Enterprise Linux 5, but this issue does not affect Linux.
References for CVE-2007-3962
-
http://osvdb.org/38569
-
http://osvdb.org/38570
-
http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.17&r2=1.18
Patch
-
http://secunia.com/advisories/26378
-
http://www.securityfocus.com/bid/25034
Patch
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:018
-
http://bugs.gentoo.org/show_bug.cgi?id=188252
-
http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.21&r2=1.22
Patch
-
http://secunia.com/advisories/27501
-
http://security.gentoo.org/glsa/glsa-200711-01.xml
-
http://fsp.cvs.sourceforge.net/fsp/fsplib/ChangeLog?revision=1.17&view=markup
CVS Info for project fspPatch
-
http://secunia.com/advisories/26184
Patch;Vendor Advisory
Jump to