Vulnerability Details : CVE-2013-7386
Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2013-7386
- cpe:2.3:a:rom_walton:boinc:7.2.33:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-7386
9.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-7386
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2013-7386
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-7386
-
https://bugzilla.redhat.com/show_bug.cgi?id=957795
957795 – (CVE-2013-7386) CVE-2013-7386 boinc-client: Format string flaw by writing account file
-
http://www.openwall.com/lists/oss-security/2013/04/28/3
oss-security - Multiple vulnerabilities in BOINC
-
http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9
boinc.berkeley.edu GitExploit;Patch
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html
[SECURITY] Fedora 20 Update: boinc-client-7.2.33-2.git1994cc8.fc20
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html
[SECURITY] Fedora 19 Update: boinc-client-7.2.33-2.git1994cc8.fc19
Jump to