Multiple buffer overflows in STLport 5.0.2 might allow local users to execute arbitrary code via (1) long locale environment variables to a strcpy function call in c_locale_glibc2.c and (2) long arguments to unspecified functions in num_put_float.cpp.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/25159 | vdb entry third party advisory |
http://sourceforge.net/project/shownotes.php?release_id=397543 | not applicable |
http://www.securityfocus.com/bid/16928 | vdb entry third party advisory |
http://secunia.com/advisories/19051 | not applicable third party advisory patch vendor advisory |
http://www.vupen.com/english/advisories/2006/0800 | vdb entry permissions required |