10
CVSSv2

CVE-2008-3908

Published: 04/09/2008 Updated: 11/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow context-dependent malicious users to execute arbitrary code via (1) a long argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or (4) WNDBVERSION environment variable; or (5) a user-supplied dictionary (aka data file). NOTE: since WordNet itself does not run with special privileges, this issue only crosses privilege boundaries when WordNet is invoked as a third party component.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

princeton university wordnet 3.0

Vendor Advisories

Debian Bug report logs - #497441 wordnet: security audit found several vulnerabilities Package: wordnet; Maintainer for wordnet is Debian Science Team <debian-science-maintainers@listsaliothdebianorg>; Source for wordnet is src:wordnet (PTS, buildd, popcon) Reported by: Thijs Kinkhorst <thijs@debianorg> Date: Mon ...
Rob Holland discovered several programming errors in WordNet, an electronic lexical database of the English language These flaws could allow arbitrary code execution when used with untrusted input, for example when WordNet is in use as a back end for a web application For the stable distribution (etch), these problems have been fixed in version 1 ...