9.3
CVSSv2

CVE-2011-4620

Published: 31/12/2011 Updated: 02/08/2016
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the ulSetError function in util/ulError.cxx in PLIB 1.8.5, as used in TORCS 1.3.1 and other products, allows user-assisted remote malicious users to execute arbitrary code via vectors involving a long error message, as demonstrated by a crafted acc file for TORCS. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

steve j baker plib 1.8.5

Vendor Advisories

Debian Bug report logs - #654785 CVE-2011-4620: Buffer overflow Package: src:plib; Maintainer for src:plib is Debian QA Group <packages@qadebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Thu, 5 Jan 2012 18:51:24 UTC Severity: grave Tags: security Found in version 185-5 Fixed in versions plib/1 ...
It was discovered that PLIB, a library used by TORCS, contains a buffer overflow in error message processing, which could allow remote attackers to execute arbitrary code For the stable distribution (squeeze), this problem has been fixed in version 185-5+squeeze1 For the testing distribution (wheezy) and the unstable distribution (sid), this pr ...

Exploits

/* Exploit Title: TORCS acc Buffer Overflow # Date: 20/12/2011 # Author: Andres Gomez # Software Link: torcssourceforgenet/ # Version: torcs 131 # Tested on: Windows # CVE : */ /* This exploit generates a corrupted acc file which has to be saved in the directories where TORCS loads its data, for example replace cars/ca ...