CVE-2010-1620
Published May 12, 2010
Last updated 15 years ago
Overview
- Description
- Integer overflow in the load_iface function in Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 might allow context-dependent attackers to execute arbitrary code via a (1) file or (2) socket that provides configuration data with many entries, leading to a heap-based buffer overflow.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-189
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:gnustep:gnustep_base:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D419B9A-A8AB-402E-8CC6-CF7475712052", "versionEndIncluding": "1.19.3" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86EAF8AB-DF06-4E78-864A-AABB609E16A8" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D19B51A-B4E1-4918-B66C-CAADBDCC7E1E" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.13.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDED7FD1-D215-4A7B-8AB5-5AE0768F4D70" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.14.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE32DE90-EF3F-4BB5-9F88-A9AB81B0C9EF" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.15.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7A123E2-1929-42F2-89A4-B7F72ED1A9FE" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.15.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAC64F8D-670C-4148-A75A-BFE612CA2A33" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.15.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A90755C5-7070-4143-834F-FACDFFE4668E" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.15.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B5EE26C-539D-4B5D-9781-1A45C74A1F35" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.17.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DB4A798-E17F-4269-91CC-DD41448A12C9" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.18.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C79ABFE1-9A5E-4A20-B977-D203854BBC0D" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.19.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5AFAEDC-5517-4B20-B461-A841183246C9" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.19.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD0DF768-8DDB-44AB-A17D-D095A11BDCC6" }, { "criteria": "cpe:2.3:a:gnustep:gnustep_base:1.19.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45AB091A-B185-4404-B022-A57E7780FE02" } ], "operator": "OR" } ] } ]