6.9
CVSSv2

CVE-2004-2541

Published: 31/12/2004 Updated: 11/10/2017
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in Cscope 15.5, and possibly multiple overflows, allows remote malicious users to execute arbitrary code via a C file with a long #include line that is later browsed by the target.

Vulnerable Product Search on Vulmon Subscribe to Product

cscope cscope 15.5

Vendor Advisories

Synopsis Moderate: cscope security update Type/Severity Security Advisory: Moderate Topic An updated cscope package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 3 and 4This update has been rated as having moderate security impact by the RedHat Security Response Team ...
Synopsis Moderate: cscope security update Type/Severity Security Advisory: Moderate Topic An updated cscope package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 5This update has been rated as having moderate security impact by the RedHat Security Response Team ...
Debian Bug report logs - #340177 CVE-2004-2541: Buffer overflows in parsing file names from #include statements Package: cscope; Maintainer for cscope is Tobias Klauser <tklauser@distanzch>; Source for cscope is src:cscope (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Mon, 21 Nov 2005 ...
Debian Bug report logs - #528510 cscope: CVE-2009-0148 multiple buffer overflows Package: cscope; Maintainer for cscope is Tobias Klauser <tklauser@distanzch>; Source for cscope is src:cscope (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Wed, 13 May 2009 11:06:04 UTC Severity: grave Tags: se ...
Jason Duell discovered that cscope, a source code browsing tool, does not verify the length of file names sourced in include statements, which may potentially lead to the execution of arbitrary code through specially crafted source code files For the old stable distribution (woody) this problem has been fixed in version 153-1woody3 For the stabl ...