Vulnerability Details : CVE-2008-3908
Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow context-dependent attackers to execute arbitrary code via (1) a long argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or (4) WNDBVERSION environment variable; or (5) a user-supplied dictionary (aka data file). NOTE: since WordNet itself does not run with special privileges, this issue only crosses privilege boundaries when WordNet is invoked as a third party component.
Vulnerability category: Execute code
Products affected by CVE-2008-3908
- cpe:2.3:a:princeton_university:wordnet:3.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-3908
3.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-3908
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2008-3908
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3908
-
http://www.ocert.org/advisories/ocert-2008-014.html
oCERT archive
-
http://securityreason.com/securityalert/4217
WordNet stack and heap overflows - CXSecurity.com
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44848
WordNet morph.c and search.c buffer overflow CVE-2008-3908 Vulnerability Report
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44851
WordNet binsrch.c and search.c buffer overflow CVE-2008-3908 Vulnerability Report
-
http://secunia.com/advisories/32184
About Secunia Research | Flexera
-
http://www.gentoo.org/security/en/glsa/glsa-200810-01.xml
WordNet: Execution of arbitrary code (GLSA 200810-01) — Gentoo security
-
http://www.ocert.org/analysis/2008-014/analysis.txt
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44849
WordNet morph_init() buffer overflow CVE-2008-3908 Vulnerability Report
-
http://www.securityfocus.com/bid/30958
Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44850
WordNet wninit() buffer overflow CVE-2008-3908 Vulnerability Report
-
http://www.ocert.org/analysis/2008-014/wordnet.patch
-
http://www.securityfocus.com/archive/1/495883/100/0/threaded
Jump to