Multiple buffer overflows in STLport before 5.0.3 allow remote attackers to execute arbitrary code via unspecified vectors relating to (1) "print floats" and (2) a missing null termination in the "rope constructor."
References
Link | Resource |
---|---|
http://sourceforge.net/project/shownotes.php?release_id=483468 | Not Applicable |
http://www.securityfocus.com/bid/22423 | Patch Third Party Advisory VDB Entry Vendor Advisory |
http://secunia.com/advisories/24024 | Not Applicable Vendor Advisory |
http://security.gentoo.org/glsa/glsa-200703-07.xml | Third Party Advisory |
http://secunia.com/advisories/24428 | Not Applicable |
http://osvdb.org/33107 | Broken Link |
http://osvdb.org/33106 | Broken Link |
http://www.vupen.com/english/advisories/2007/0498 | Permissions Required |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32244 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32242 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2007-02-07 03:28
Updated : 2022-07-19 11:34
NVD link : CVE-2007-0803
Mitre link : CVE-2007-0803
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
stlport_project
- stlport