7.5
CVSSv2

CVE-2008-2149

Published: 12/05/2008 Updated: 08/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the searchwn function in Wordnet 2.0, 2.1, and 3.0 might allow context-dependent malicious users to execute arbitrary code via a long command line option. NOTE: this issue probably does not cross privilege boundaries except in cases in which Wordnet is used as a back end.

Vulnerable Product Search on Vulmon Subscribe to Product

wordnet wordnet 3.0

wordnet wordnet 2.0

wordnet wordnet 2.1

Vendor Advisories

Debian Bug report logs - #481186 CVE-2008-2149: buffer overflows Package: wordnet; Maintainer for wordnet is Debian Science Team <debian-science-maintainers@listsaliothdebianorg>; Source for wordnet is src:wordnet (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Wed, 14 May 20 ...
Rob Holland discovered several programming errors in WordNet, an electronic lexical database of the English language These flaws could allow arbitrary code execution when used with untrusted input, for example when WordNet is in use as a back end for a web application For the stable distribution (etch), these problems have been fixed in version 1 ...