5.1
CVSSv2

CVE-2006-4262

Published: 23/08/2006 Updated: 11/10/2017
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in cscope 15.5 and previous versions allow user-assisted malicious users to cause a denial of service (crash) and possibly execute arbitrary code via multiple vectors including (1) a long pathname that is not properly handled during file list parsing, (2) long pathnames that result from path variable expansion such as tilde expansion for the HOME environment variable, and (3) a long -f (aka reffile) command line argument.

Vulnerable Product Search on Vulmon Subscribe to Product

cscope cscope

Vendor Advisories

Synopsis Moderate: cscope security update Type/Severity Security Advisory: Moderate Topic An updated cscope package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 3 and 4This update has been rated as having moderate security impact by the RedHat Security Response Team ...
Debian Bug report logs - #385893 CVE-2006-4262: Cscope Buffer Overflow Vulnerabilities Package: cscope; Maintainer for cscope is Tobias Klauser <tklauser@distanzch>; Source for cscope is src:cscope (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Sun, 3 Sep 2006 20:33:05 UTC Severity: grave ...
Will Drewry of the Google Security Team discovered several buffer overflows in cscope, a source browsing tool, which might lead to the execution of arbitrary code For the stable distribution (sarge) this problem has been fixed in version 155-11sarge2 For the unstable distribution (sid) this problem has been fixed in version 155+cvs20060902-1 ...