Integer overflow in the load_iface function in Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 might allow context-dependent attackers to execute arbitrary code via a (1) file or (2) socket that provides configuration data with many entries, leading to a heap-based buffer overflow.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://secunia.com/advisories/39746 | third party advisory vendor advisory |
http://savannah.gnu.org/bugs/?29755 | |
http://thread.gmane.org/gmane.comp.lib.gnustep.bugs/12336 | exploit |
http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz | patch |
http://marc.info/?l=oss-security&m=127325778527537&w=2 | mailing list |
http://marc.info/?l=oss-security&m=127324274005709&w=2 | mailing list |
https://bugs.launchpad.net/ubuntu/+source/gnustep-base/+bug/573108 | exploit |