9.3
CVSSv2

CVE-2009-0148

Published: 05/05/2009 Updated: 29/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in Cscope prior to 15.7a allow remote malicious users to execute arbitrary code via long strings in input such as (1) source-code tokens and (2) pathnames, related to integer overflows in some cases. NOTE: this issue exists because of an incomplete fix for CVE-2004-2541.

Vulnerable Product Search on Vulmon Subscribe to Product

cscope cscope 15.5

cscope cscope 15.6

cscope cscope 15.4

cscope cscope 15.7

cscope cscope 13.0

cscope cscope 15.1

cscope cscope 15.0bl2

cscope cscope 15.3

Vendor Advisories

Debian Bug report logs - #528510 cscope: CVE-2009-0148 multiple buffer overflows Package: cscope; Maintainer for cscope is Tobias Klauser <tklauser@distanzch>; Source for cscope is src:cscope (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Wed, 13 May 2009 11:06:04 UTC Severity: grave Tags: se ...
Synopsis Moderate: cscope security update Type/Severity Security Advisory: Moderate Topic An updated cscope package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 3 and 4This update has been rated as having moderate security impact by the RedHat Security Response Team ...
Synopsis Moderate: cscope security update Type/Severity Security Advisory: Moderate Topic An updated cscope package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 5This update has been rated as having moderate security impact by the RedHat Security Response Team ...
Matt Murphy discovered that cscope, a source code browsing tool, does not verify the length of file names sourced in include statements, which may potentially lead to the execution of arbitrary code through specially crafted source code files For the stable distribution (lenny), this problem has been fixed in version 156-6+lenny1 Due to a techni ...